2014 IEEE Computers, Communications and IT Applications Conference 2014
DOI: 10.1109/comcomap.2014.7017178
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Backdrop: A SCADA testbed

Abstract: Supervisory Control and Data Acquisition (SCADA) systems are traditionally proprietary and well protected. Due to increasing use of commercial/open source technology and communication protocols, there are growing concerns about the associated security threats. SCADA networks are usually employed in critical infrastructure, therefore, not much technical data of the actual systems is accessible to the research community.Most of the researchers simulate the SCADA functioning through development of testbed. Such p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…In [7], it is presented a testbed for Supervisory Control and Data Acquisition (SCADA) using TrueTime -a MAT-LAB/Simulink based tool. The authors demonstrate an attack where a malicious agent transmits false signals to the controller and actuator of an NCS.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [7], it is presented a testbed for Supervisory Control and Data Acquisition (SCADA) using TrueTime -a MAT-LAB/Simulink based tool. The authors demonstrate an attack where a malicious agent transmits false signals to the controller and actuator of an NCS.…”
Section: Related Workmentioning
confidence: 99%
“…In [1], it is demonstrated another stealth attack where the attacker, aware of the system's model, injects an attack signal in the NCS to steal water from the Gignac canal system located in Southern France. [11] Modifications Yes Experiments in the PLC in a real code system Long, et al [12] Inducing jitter None N/A and packet loss Farooqui, et al [7] Data injection None N/A Smith [16,17] Data injection Yes Not described Teixeira [20] Packet loss None N/A Data injection Yes Not described Amin [1] Data injection Yes Not described SD-Controlled [5] Data injection Yes Passive system identification…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [4], the authors demonstrate an attack where false signals are transmitted to the controller and the actuator of an NCS. The false signals are randomly generated by the attacker, aiming to cause the instability of the plant (a DC motor).…”
Section: Related Workmentioning
confidence: 99%
“…The integration of controllers and physical processes via communication networks aims to provide these systems with better operational and management capabilities, as well as reduce costs. By virtue of these advantages, the number of NCSs applied to industrial processes and critical infrastructure systems is increasing [1][2][3][4][5][6][7][8][9][10]. A diagram of an NCS is depicted in Networked control system (NCS) [12] plant's behavior are physically difficult to be perceived.…”
Section: Introductionmentioning
confidence: 99%