Blog
About

  • Record: found
  • Abstract: found
  • Article: found
Is Open Access

Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks

, ,

2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014) (ICSCSR)

ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)

11-12 September 2014

SCADA, Cyber-security, Man-in-the-middle attacks, IEC 60870-5-104

Read this article at

Bookmark
      There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

      Abstract

      This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.

      Related collections

      Most cited references 5

      • Record: found
      • Abstract: not found
      • Article: not found

      Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs

        Bookmark
        • Record: found
        • Abstract: not found
        • Article: not found

        A testbed for SCADA control system cybersecurity research and pedagogy

          Bookmark
          • Record: found
          • Abstract: not found
          • Article: not found

          ICT resilience of power control systems experimental results from the CRUTIAL testbeds

            Bookmark

            Author and article information

            Affiliations
            Centre for Secure Information Technologies (CSIT)

            Queen’s University Belfast
            LINZ STROM GmbH
            Contributors
            Conference
            September 2014
            September 2014
            : 30-42
            10.14236/ewic/ICSCSR2014.5
            © Peter Maynard et al. Published by BCS Learning and Development Ltd. 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014), St Pölten, Austria

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
            ICSCSR
            2
            St Pölten, Austria
            11-12 September 2014
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
            Product
            Product Information: 1477-9358 BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Comments

            Comment on this article