Blog
About

212
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks

      , ,

      2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014) (ICSCSR)

      ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)

      11-12 September 2014

      SCADA, Cyber-security, Man-in-the-middle attacks, IEC 60870-5-104

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.

          Related collections

          Most cited references 5

          • Record: found
          • Abstract: not found
          • Article: not found

          Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            ICT resilience of power control systems experimental results from the CRUTIAL testbeds

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A testbed for SCADA control system cybersecurity research and pedagogy

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2014
                September 2014
                : 30-42
                Affiliations
                Centre for Secure Information Technologies (CSIT)

                Queen’s University Belfast
                LINZ STROM GmbH
                10.14236/ewic/ICSCSR2014.5
                © Peter Maynard et al. Published by BCS Learning and Development Ltd. 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014), St Pölten, Austria

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
                ICSCSR
                2
                St Pölten, Austria
                11-12 September 2014
                Electronic Workshops in Computing (eWiC)
                ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
                Product
                Product Information: 1477-9358 BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article