Visible to the public An overview of cyber-attack vectors on SCADA systems

TitleAn overview of cyber-attack vectors on SCADA systems
Publication TypeConference Paper
Year of Publication2018
AuthorsIrmak, E., Erkek, İ
Conference Name2018 6th International Symposium on Digital Forensic and Security (ISDFS)
Date Publishedmar
Keywordsattack vectors, Buffer overflows, critical infrastructure, critical infrastructures, cyber-attack, cyber-attack vectors, Human Behavior, industrial control systems, Monitoring, Protocols, pubcrawl, Resiliency, SCADA, SCADA systems, Scalability, security, security of data, Software, supervisory control and data acquisition systems, TCP/IP based protocols, transport protocols

Most of the countries evaluate their energy networks in terms of national security and define as critical infrastructure. Monitoring and controlling of these systems are generally provided by Industrial Control Systems (ICSs) and/or Supervisory Control and Data Acquisition (SCADA) systems. Therefore, this study focuses on the cyber-attack vectors on SCADA systems to research the threats and risks targeting them. For this purpose, TCP/IP based protocols used in SCADA systems have been determined and analyzed at first. Then, the most common cyber-attacks are handled systematically considering hardware-side threats, software-side ones and the threats for communication infrastructures. Finally, some suggestions are given.

Citation Keyirmak_overview_2018