Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks

Peter Maynard, Kieran McLaughlin, Berthold Haberler

Research output: Contribution to conferencePaperpeer-review

Abstract

This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.
Original languageEnglish
DOIs
Publication statusPublished - 12 Sept 2014
EventInternational Symposium for ICS & SCADA Cyber Security Research (ICS-CSR) - Austria, St Polten, Austria
Duration: 11 Sept 2014 → …

Conference

ConferenceInternational Symposium for ICS & SCADA Cyber Security Research (ICS-CSR)
Country/TerritoryAustria
CitySt Polten
Period11/09/2014 → …

Fingerprint

Dive into the research topics of 'Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks'. Together they form a unique fingerprint.

Cite this