Projects per year
Abstract
This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.
Original language | English |
---|---|
DOIs | |
Publication status | Published - 12 Sept 2014 |
Event | International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR) - Austria, St Polten, Austria Duration: 11 Sept 2014 → … |
Conference
Conference | International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR) |
---|---|
Country/Territory | Austria |
City | St Polten |
Period | 11/09/2014 → … |
Fingerprint
Dive into the research topics of 'Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks'. Together they form a unique fingerprint.Projects
- 2 Finished
-
-
R1118ECI: Centre for Secure Information Technologies (CSIT)
McCanny, J. V. (PI), Cowan, C. (CoI), Crookes, D. (CoI), Fusco, V. (CoI), Linton, D. (CoI), Liu, W. (CoI), Miller, P. (CoI), O'Neill, M. (CoI), Scanlon, W. (CoI) & Sezer, S. (CoI)
01/08/2009 → 30/06/2014
Project: Research
Research output
- 1 Conference contribution
-
Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction
Maynard, P., McLaughlin, K. & Sezer, S., 21 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy. SciTePress, p. 465-472 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile11 Citations (Scopus)920 Downloads (Pure)