IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v25y2019icp14-35.html
   My bibliography  Save this article

Extending the cyber-attack landscape for SCADA-based critical infrastructure

Author

Listed:
  • Rodofile, Nicholas R.
  • Radke, Kenneth
  • Foo, Ernest

Abstract

The move from point-to-point serial communication to traditional information technology (IT) networks has created new challenges in providing cyber-security for supervisory control and data acquisition (SCADA) systems in critical infrastructure. Current research on the attack landscape for critical infrastructure concentrates on either IT-based or protocol specific attacks. However, there is limited research focus on “the bigger picture”, the combination of IT attacks and critical infrastructure protocol attacks, and little consideration of cyber-attacks targeting an entire (SCADA)-based critical infrastructure system. Due to such narrow research, there is a complete lack of focus when comprehending full-scale cyber attacks on SCADA-based critical infrastructure systems. As a result, new attacks combining various vulnerabilities in engineering systems and IT systems are yet to be discovered.

Suggested Citation

  • Rodofile, Nicholas R. & Radke, Kenneth & Foo, Ernest, 2019. "Extending the cyber-attack landscape for SCADA-based critical infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 25(C), pages 14-35.
  • Handle: RePEc:eee:ijocip:v:25:y:2019:i:c:p:14-35
    DOI: 10.1016/j.ijcip.2019.01.002
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548217300276
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2019.01.002?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Knowles, William & Prince, Daniel & Hutchison, David & Disso, Jules Ferdinand Pagna & Jones, Kevin, 2015. "A survey of cyber security management in industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 9(C), pages 52-80.
    2. Huitsing, Peter & Chandia, Rodrigo & Papa, Mauricio & Shenoi, Sujeet, 2008. "Attack taxonomies for the Modbus protocols," International Journal of Critical Infrastructure Protection, Elsevier, vol. 1(C), pages 37-44.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ajit Kumar & Neetesh Saxena & Souhwan Jung & Bong Jun Choi, 2021. "Improving Detection of False Data Injection Attacks Using Machine Learning with Feature Selection and Oversampling," Energies, MDPI, vol. 15(1), pages 1-22, December.
    2. Li, Xueping & Wang, Yaokun & Lu, Zhigang, 2023. "Graph-based detection for false data injection attacks in power grid," Energy, Elsevier, vol. 263(PC).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. CHERIFI, Tarek & HAMAMI, Lamia, 2018. "A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol," International Journal of Critical Infrastructure Protection, Elsevier, vol. 20(C), pages 68-84.
    2. Monzer, Mohamad-Houssein & Beydoun, Kamal & Ghaith, Alaa & Flaus, Jean-Marie, 2022. "Model-based IDS design for ICSs," Reliability Engineering and System Safety, Elsevier, vol. 225(C).
    3. Ghaleb, Asem & Zhioua, Sami & Almulhem, Ahmad, 2018. "On PLC network security," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 62-69.
    4. Nai Fovino, Igor & Masera, Marcelo & De Cian, Alessio, 2009. "Integrating cyber attacks within fault trees," Reliability Engineering and System Safety, Elsevier, vol. 94(9), pages 1394-1402.
    5. Juntao Chen & Quanyan Zhu & Tamer Başar, 2021. "Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks," Dynamic Games and Applications, Springer, vol. 11(2), pages 294-325, June.
    6. Mohammed Alghassab, 2021. "Analyzing the Impact of Cybersecurity on Monitoring and Control Systems in the Energy Sector," Energies, MDPI, vol. 15(1), pages 1-21, December.
    7. Rahman, Ayesha & Mustafa, Ghulam & Khan, Abdul Qayyum & Abid, Muhammad & Durad, Muhammad Hanif, 2022. "Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms," International Journal of Critical Infrastructure Protection, Elsevier, vol. 39(C).
    8. Rajan, Rishabh & Rana, Nripendra P. & Parameswar, Nakul & Dhir, Sanjay & Sushil, & Dwivedi, Yogesh K., 2021. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management," Technological Forecasting and Social Change, Elsevier, vol. 170(C).
    9. Pramod T. C. & Thejas G. S. & S. S. Iyengar & N. R. Sunitha, 2019. "CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems," Future Internet, MDPI, vol. 11(6), pages 1-25, June.
    10. Eric DuBois & Ashley Peper & Laura A. Albert, 2023. "Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach," Decision Analysis, INFORMS, vol. 20(3), pages 202-219, September.
    11. Cheng-Hui Chou & Chi-Che Wu & Kuan-Chu Lu & I-Hsien Liu & Tien-Hsiang Chang & Chu-Fen Li & Jung-Shian Li, 2018. "Modbus Packet Analysis and Attack Mode for SCADA System," Journal of ICT, Design, Engineering and Technological Science, Juhriyansyah Dalle, vol. 2(2), pages 30-35.
    12. Alvaro Llaria & Jessye Dos Santos & Guillaume Terrasson & Zina Boussaada & Christophe Merlo & Octavian Curea, 2021. "Intelligent Buildings in Smart Grids: A Survey on Security and Privacy Issues Related to Energy Management," Energies, MDPI, vol. 14(9), pages 1-37, May.
    13. Yampolskiy, Mark & Skjellum, Anthony & Kretzschmar, Michael & Overfelt, Ruel A. & Sloan, Kenneth R. & Yasinsac, Alec, 2016. "Using 3D printers as weapons," International Journal of Critical Infrastructure Protection, Elsevier, vol. 14(C), pages 58-71.
    14. Vlad Daniel SAVIN & Costel SERBAN, 2019. "Cybersecurity Vulnerabilities And Threats Of Scada Systems In Critical Infrastructures," Proceedings of the INTERNATIONAL MANAGEMENT CONFERENCE, Faculty of Management, Academy of Economic Studies, Bucharest, Romania, vol. 13(1), pages 234-237, November.
    15. Jarmakiewicz, Jacek & Parobczak, Krzysztof & Maślanka, Krzysztof, 2017. "Cybersecurity protection for power grid control infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 18(C), pages 20-33.
    16. Nai Fovino, Igor & Carcano, Andrea & Masera, Marcelo & Trombetta, Alberto, 2009. "An experimental investigation of malware attacks on SCADA systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 2(4), pages 139-145.
    17. Mustafa, Faizan E & Ahmed, Ijaz & Basit, Abdul & Alvi, Um-E-Habiba & Malik, Saddam Hussain & Mahmood, Atif & Ali, Paghunda Roheela, 2023. "A review on effective alarm management systems for industrial process control: Barriers and opportunities," International Journal of Critical Infrastructure Protection, Elsevier, vol. 41(C).
    18. Staggs, Jason & Ferlemann, David & Shenoi, Sujeet, 2017. "Wind farm security: attack surface, targets, scenarios and mitigation," International Journal of Critical Infrastructure Protection, Elsevier, vol. 17(C), pages 3-14.
    19. Xinzhan Li & Yang Zhou & Xin Li & Lijuan Xu & Dawei Zhao, 2022. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm," Mathematics, MDPI, vol. 10(21), pages 1-24, October.
    20. Despoina Chochtoula & Aristidis Ilias & Yannis C. Stamatiou & Christos Makris, 2022. "Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol," Future Internet, MDPI, vol. 14(8), pages 1-18, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:25:y:2019:i:c:p:14-35. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.