Show simple item record

dc.contributor.authorTzokatziou, Grigorisen
dc.contributor.authorMaglaras, Leandrosen
dc.contributor.authorJanicke, Helgeen
dc.contributor.authorHe, Yingen
dc.date.accessioned2017-01-18T11:27:46Z
dc.date.available2017-01-18T11:27:46Z
dc.date.issued2015
dc.identifier.citationTzokatziou, G., Maglaras, L., Janicke, H. and He Y. (2015) Exploiting SCADA vulnerabilities using a Human Interface Device. International Journal of Advanced Computer Science and Applications, 6 (7),en
dc.identifier.urihttp://hdl.handle.net/2086/13185
dc.descriptionThis is an Open Access articleen
dc.description.abstractSCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic Controllers) are one of the most critical components of a control system. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/technical vulnerabilities or even weaknesses in the defense systems. Even though novel intrusion detection systems are being implemented and used for defending cyber-attacks, certain vulnerabilities of SCADA systems can still be exploited. In this article we present an attack scenario based on a Human Interface Device (HID) device which is used as a means of communication/exploitation tool to compromise SCADA systems. The attack, which is a normal series of commands that are sent from the HID to the PLC cannot be detected through current intrusion detection mechanisms. Finally we provide possible counter measures and defense mechanisms against this kind of cyber attacks.en
dc.language.isoenen
dc.publisherThe Science and InformationOrganizationen
dc.subjectSCADAen
dc.subjectCyber Securityen
dc.subjectHIDen
dc.subjectPLCen
dc.titleExploiting SCADA vulnerabilities using a Human Interface Deviceen
dc.typeArticleen
dc.identifier.doihttp://dx.doi.org/10.14569/IJACSA.2015.060731
dc.peerreviewedYesen
dc.funderN/Aen
dc.projectidN/Aen
dc.cclicenceCC BYen
dc.date.acceptance2015-06-01en
dc.researchinstituteCyber Technology Institute (CTI)en


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record