3,287
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks

      proceedings-article
      , ,
      2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014) (ICSCSR)
      ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
      11-12 September 2014
      SCADA, Cyber-security, Man-in-the-middle attacks, IEC 60870-5-104
      Bookmark

            Abstract

            This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.

            Content

            Author and article information

            Contributors
            Conference
            September 2014
            September 2014
            : 30-42
            Affiliations
            [0001]Centre for Secure Information Technologies (CSIT)

            Queen’s University Belfast
            [0002]LINZ STROM GmbH
            Article
            10.14236/ewic/ICSCSR2014.5
            106350c2-695f-4be6-80b2-326c8761f561
            © Peter Maynard et al. Published by BCS Learning and Development Ltd. 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014), St Pölten, Austria

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
            ICSCSR
            2
            St Pölten, Austria
            11-12 September 2014
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICSCSR2014.5
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Man-in-the-middle attacks,SCADA,Cyber-security,IEC 60870-5-104

            Comments

            Comment on this article