Simulated Attack on DNP3 Protocol in SCADA System
نویسندگان
چکیده
Supervisory Control and Data Acquisition (SCADA) system monitors and controls industrial process in physical critical Infrastructures. It is thus of vital importance that any vulnerabilities of SCADA system must be identified and mitigated. DNP3 is and open SCADA network protocol that is mainly used in electrical utilities. However, the security mechanisms of DNP3 were neglected at its design stage. For example, the coverage of DNP3 Secure Authentication is limited to itself only. In our experiments, we have successfully performed a number of attacks to DNP3 on a small-scale testbed. Hence, this paper will not only discuss our experimental results but also propose a novel hybrid method that can enhance the security of existing DNP3 protocol by combining both encryption and authentication techniques.
منابع مشابه
Building Small-Scale Testbed for DNP3 Protocol in SCADA system
SCADA is a type of industrial control systems which monitor and control the industrial device. To adjust the smart-grid, a new method is needed which improves security to SCADA system. But a difficulty for small laboratory happens to research SCADA system in a large scale, because of building own testbed. In this paper, a testbed in a lab environment is suggested to attack and defence DNP3 prot...
متن کاملUsing a Specification-based Intrusion Detection System to Extend the DNP3 Protocol with Security Functionalities
Modern SCADA systems are increasingly adopting Internet technologies to control distributed industrial assets. As proprietary communication protocols are increasingly being used over public networks without efficient protection mechanisms, it is increasingly easier for attackers to penetrate into the communication networks of companies that operate electrical power grids, water plants, and othe...
متن کاملAdapting Bro into SCADA: Building Specification-based Intrusion Detection System for DNP3 Protocol
Modern SCADA systems are increasingly adopting Internet technology to control industry processes. With their security vulnerabilities exposed to public networks, an attacker is able to penetrate into these control systems to put remote facilities in danger. To detect such attacks, SCADA systems require an intrusion detection technique that can monitor network traffic based on proprietary networ...
متن کاملA Taxonomy of Attacks on the DNP3 Protocol
Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector – more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (in...
متن کاملDesign and Development of Layered Security: Future Enhancements and Directions in Transmission
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013