2018
DOI: 10.14419/ijet.v7i2.14.12816
|View full text |Cite
|
Sign up to set email alerts
|

Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system

Abstract: IEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the most common attacks which has a catastrophic impact on industrial control systems is the control command injection attack. It happens when an attacker injects false control commands into a control system. This paper pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…SCADA system's decision-making entirely depends on the data received from the RTU; based on the received data, the control actions will be taken and sent to the actuator [4]. Therefore, if attackers intended to cause damage to the system, they could exploit vulnerabilities of the communication protocols to intercept and modify the control commands or simply disrupt the data transfer [14]. One of the most significant challenges in securing the SCADA systems is the outdated and insecure communication protocols being implemented many years ago in various sectors [15].…”
Section: Introductionmentioning
confidence: 99%
“…SCADA system's decision-making entirely depends on the data received from the RTU; based on the received data, the control actions will be taken and sent to the actuator [4]. Therefore, if attackers intended to cause damage to the system, they could exploit vulnerabilities of the communication protocols to intercept and modify the control commands or simply disrupt the data transfer [14]. One of the most significant challenges in securing the SCADA systems is the outdated and insecure communication protocols being implemented many years ago in various sectors [15].…”
Section: Introductionmentioning
confidence: 99%