2018
DOI: 10.1109/mis.2018.111145022
|View full text |Cite
|
Sign up to set email alerts
|

Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0
6

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(22 citation statements)
references
References 8 publications
0
16
0
6
Order By: Relevance
“…Cuando se precisa analizar el concepto de ciberseguridad, específicamente el que se incluye en el ámbito de la seguridad industrial, se entiende que la información, los sistemas o las instalaciones deben ser protegidos de peligros externos tales como ataques o amenazas que se originen desde medios tecnológicos. De esta manera, el diseño de los programas que estén destinados a mejorar la seguridad deben proveer una confidencialidad adecuada, además del uso de protocolos específicos [9]- [12].…”
Section: Resultsunclassified
See 2 more Smart Citations
“…Cuando se precisa analizar el concepto de ciberseguridad, específicamente el que se incluye en el ámbito de la seguridad industrial, se entiende que la información, los sistemas o las instalaciones deben ser protegidos de peligros externos tales como ataques o amenazas que se originen desde medios tecnológicos. De esta manera, el diseño de los programas que estén destinados a mejorar la seguridad deben proveer una confidencialidad adecuada, además del uso de protocolos específicos [9]- [12].…”
Section: Resultsunclassified
“…Después de ello se debe realizar un análisis de la identificación de las amenazas y vulnerabilidades a través de diferentes técnicas y herramientas que han sido expuestas por Shodan, Kali Linux, Network Security Toolkit (NST), Bugtraq y Nessus. Aquí se descubren las diferentes amenazas y vulnerabilidades que se asocian con los activos y con las agrupaciones de los mismos [12], [19]. Es importante solo usar herramientas que no sean intrusivas en el entorno operativo.…”
Section: Testeo Y Auditoríasunclassified
See 1 more Smart Citation
“…Despite the significant benefits, this connectivity increases the possibility of security being compromised via malware, buffer overflow, and denial-of-service (DoS) attacks. [5][6][7] The latest reported attacks, such as the Ukraine's power grid attack by the Industroyer malware, which caused 1 h collapse of systems responsible for serving Kiev with electricity; 8 Dyn cyberattack, 9 involving distributed denial-of-service (DDoS) attacks targeting systems operated by the domain name system (DNS) provider Dyn; the Jeep Cherokee Hack, 10 where hackers were able to remotely control the brakes and steering of the vehicle; and Triton malware used to shut down an industrial process by exploiting weaknesses in industrial control system (ICS) are proof that the IIoT devices need a robust security to avoid any security issue. Nonauthorized access into IIoT networks can lead to a loss in brand loyalty, reputation, revenue, or market share, and more depending on the nature and severity of the attack.…”
Section: Introductionmentioning
confidence: 99%
“…From an embedded architecture point-of-view, a major reason for this is the need for varying levels of security, cannot be defined generically due to being highly dependent on the deployment scenario which could be based on consumer, transport, medical and industrial control applications. As a consequence, devices have been found vulnerable, with the same flaws affecting different use cases, leading to attacks affecting privacy, device integrity, and risking loss of sensitive information [4], [5].…”
Section: Introductionmentioning
confidence: 99%