Blog
About

135
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      An Initial Investigation into Attribution in SCADA Systems

      , ,

      1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013) (ICSCSR)

      ICS & SCADA Cyber Security Research 2013

      16-17 September 2013

      SCADA, Critical Infrastructure, Attribution, Cyber, Attacks

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Supervisory control and Data Acquisition (SCADA) systems play a core role in a nation’s critical infrastructure, overseeing the monitoring and control of systems in electricity, gas supply, logistics services, banks and hospitals. SCADA systems were once separated from other networks and used proprietary communications protocols, hardware and software. Nowadays modern SCADA systems are increasingly directly or indirectly connected to the Internet, use standardised protocols and commercial-off-the-shelf hardware and software. Attacks on these systems have the potential for devastating consequences and attribution of attacks against SCADA systems presents new challenges. This paper investigates the use of techniques to attribute cyber attacks against SCADA systems.We investigate the use of five known technical attribution techniques in SCADA systems.

          Related collections

          Most cited references 6

          • Record: found
          • Abstract: not found
          • Article: not found

          SCADA security in the light of Cyber-Warfare

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            IP traceback with deterministic packet marking

             A Belenky,  N. Ansari (2003)
              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2013
                September 2013
                : 56-65
                Affiliations
                Cyber Security Centre

                De Montfort University

                UK
                Software Technology Research Laboratory

                De Montfort University

                UK
                Article
                10.14236/ewic/ICSCSR2013.7
                © Andrew Nicholson et al. Published by BCS Learning and Development Ltd. 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013), Leicester, UK

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013)
                ICSCSR
                1
                Leicester, UK
                16-17 September 2013
                Electronic Workshops in Computing (eWiC)
                ICS & SCADA Cyber Security Research 2013
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article