Abstract
This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.
| Original language | English |
|---|---|
| DOIs | |
| Publication status | Published - 12 Sept 2014 |
| Event | International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR) - Austria, St Polten, Austria Duration: 11 Sept 2014 → … |
Conference
| Conference | International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR) |
|---|---|
| Country/Territory | Austria |
| City | St Polten |
| Period | 11/09/2014 → … |
Fingerprint
Dive into the research topics of 'Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks'. Together they form a unique fingerprint.Projects
- 1 Finished
Research output
- 1 Conference contribution
-
Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction
Maynard, P., McLaughlin, K. & Sezer, S., 21 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy. SciTePress, p. 465-472 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile12 Link opens in a new tab Citations (Scopus)1053 Downloads (Pure)
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver