Blog
About

134
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape

      , , ,

      2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014) (ICSCSR)

      ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)

      11-12 September 2014

      Secure control, ICS security, state estimation, control loop

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          There are almost as many ways to implement Industrial Control Systems as there are ways to control industrial systems. This produces a wide-varying range of possible architectures for the SCADA networks that control them. This paper organizes SCADA networks based on these various control architectures in order to evaluate how different controlmodels and architectures can affect the threat model.We observe that distributed control, with control logic in the endpoints, is more susceptible to attacks on SCADA endpoints and that distributed state architectures,with centralized control, ismore susceptible to attacks on the SCADA master.

          Related collections

          Most cited references 2

          • Record: found
          • Abstract: not found
          • Article: not found

          Power System Control Centers: Past, Present, and Future

           K. Moslehi,  A Bose,  F.F. Wu (2005)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Staying in control: Cybersecurity and the modern electric grid

              Bookmark

              Author and article information

              Conference
              September 2014
              September 2014
              : 72-77
              Affiliations
              École Polytechnique de Montréal
              Hamburg University of Technology
              Royal Military College of Canada
              Article
              10.14236/ewic/ICSCSR2014.10
              © Antoine Lemay et al. Published by BCS Learning and Development Ltd. 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014), St Pölten, Austria

              This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

              2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
              ICSCSR
              2
              St Pölten, Austria
              11-12 September 2014
              Electronic Workshops in Computing (eWiC)
              ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
              Product
              Product Information: 1477-9358BCS Learning & Development
              Self URI (journal page): https://ewic.bcs.org/
              Categories
              Electronic Workshops in Computing

              Comments

              Comment on this article