Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Covert Penetrations: Analyzing and Defending SCADA Systems from Stealth and Hijacking Attacks

View through CrossRef
SCADA (Supervisory Control and Data Acquisition) systems play a pivotal role in managing critical industrial processes, extending from energy production to manufacturing. However, their widespread adoption and increased interconnectivity has exposed them to evolving cyber threats, demanding a thorough vulnerability assessment and effective defense mechanisms. This research focuses on revealing novel internal threats within SCADA systems capable of eluding conventional monitoring nodes. To simulate real-world scenarios, we've developed a virtualized SCADA testbed faithfully replicating Industrial Control Systems (ICS) complexities. Within this virtualized environment, we've introduced two groundbreaking covert attack scenarios. The SCADA Hijacking Attack illustrates an intruder manipulating process parameters deceptively to hijack the system without detection. Simultaneously, the SCADA Blackout discreetly halts the entire process. To fortify SCADA systems against these stealthier attacks, we propose a defense mechanism leveraging machine learning-based Network Intrusion Detection Systems (NIDS). These NIDS utilize meticulously crafted network features, discerning patterns indicative of covert infiltrations, surpassing traditional IDS approaches. Our research not only reveals potential threats within SCADA environments but also establishes the groundwork for enhancing the resilience of these critical systems against stealth and hijacking attacks.
Institute of Electrical and Electronics Engineers (IEEE)
Title: Covert Penetrations: Analyzing and Defending SCADA Systems from Stealth and Hijacking Attacks
Description:
SCADA (Supervisory Control and Data Acquisition) systems play a pivotal role in managing critical industrial processes, extending from energy production to manufacturing.
However, their widespread adoption and increased interconnectivity has exposed them to evolving cyber threats, demanding a thorough vulnerability assessment and effective defense mechanisms.
This research focuses on revealing novel internal threats within SCADA systems capable of eluding conventional monitoring nodes.
To simulate real-world scenarios, we've developed a virtualized SCADA testbed faithfully replicating Industrial Control Systems (ICS) complexities.
Within this virtualized environment, we've introduced two groundbreaking covert attack scenarios.
The SCADA Hijacking Attack illustrates an intruder manipulating process parameters deceptively to hijack the system without detection.
Simultaneously, the SCADA Blackout discreetly halts the entire process.
To fortify SCADA systems against these stealthier attacks, we propose a defense mechanism leveraging machine learning-based Network Intrusion Detection Systems (NIDS).
These NIDS utilize meticulously crafted network features, discerning patterns indicative of covert infiltrations, surpassing traditional IDS approaches.
Our research not only reveals potential threats within SCADA environments but also establishes the groundwork for enhancing the resilience of these critical systems against stealth and hijacking attacks.

Related Results

Topic Hijacking in Online Health Communities
Topic Hijacking in Online Health Communities
Online health communities (OHCs) are conventionally recognized as information commons for mutual exchange among peer users with similar health concerns. Extant research reckons tha...
Topic Hijacking in Online Health Communities
Topic Hijacking in Online Health Communities
<span>Online health communities (OHCs) are conventionally recognized as information commons for mutual exchange among peer users with similar health concerns. Extant research...
Covert Penetrations: Analyzing and Defending SCADA Systems from Stealth and Hijacking Attacks
Covert Penetrations: Analyzing and Defending SCADA Systems from Stealth and Hijacking Attacks
SCADA (Supervisory Control and Data Acquisition) systems are critical for managing industrial processes, including energy production, manufacturing, and transportation. However, t...
Design of high transparent infrared stealth thin films based on FTO/Ag/FTO structure
Design of high transparent infrared stealth thin films based on FTO/Ag/FTO structure
Multi-spectral compatible stealth materials have become an imperative development trend, especially visible and infrared compatible stealth materials have become the most important...
Evaluation of the timing covert channel capacity considering packet transfer time distribution
Evaluation of the timing covert channel capacity considering packet transfer time distribution
Lampson was the first to introduce a covert channel as a channel that was not designed for information transmission. The problem of information leakage via network covert channels ...
IMPROVING THE CYBERSECURITY OF SCADA SYSTEMS
IMPROVING THE CYBERSECURITY OF SCADA SYSTEMS
This paper focuses on improving the cybersecurity of Supervisory Control and Data Acquisition (SCADA) systems, which play a critical role in managing industrial and critical infras...
A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification
A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in providing remote access, monitoring and control of critical infrastructures (CIs) which includes...
A Covert Timing Channels Data Encryption Sceme In Cloud Simulation
A Covert Timing Channels Data Encryption Sceme In Cloud Simulation
Covert Timing Channels (CTC) have become an impending network security problem as the sophistication and use of data exfiltration carried out by cyber-attacks has increased. Inter-...

Back to Top