Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems


Autoria(s): Yang, Yi; McLaughlin, Kieran; Littler, Timothy; Sezer, Sakir; Gyu Im, Eul; Pranggono, Bernardi; Wang, Haifeng
Data(s)

01/09/2012

Resumo

The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.

Identificador

http://pure.qub.ac.uk/portal/en/publications/maninthemiddle-attack-testbed-investigating-cybersecurity-vulnerabilities-in-smart-grid-scada-systems(83f11a29-8dfc-4967-9fb4-097ec1782497).html

http://dx.doi.org/10.1049/cp.2012.1831

Idioma(s)

eng

Direitos

info:eu-repo/semantics/restrictedAccess

Fonte

Yang , Y , McLaughlin , K , Littler , T , Sezer , S , Gyu Im , E , Pranggono , B & Wang , H 2012 , Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems . in Proceedings of the International Conference on Sustainable Power Generation (SUPERGEN 2012) . 611 CP edn , vol. 2012 , Sustainable Power Generation and Supply (SUPERGEN) 2012 IET International Conf. on , Hangzhou , China , 8-9 September . DOI: 10.1049/cp.2012.1831

Palavras-Chave #/dk/atira/pure/subjectarea/asjc/1700/1705 #Computer Networks and Communications #/dk/atira/pure/subjectarea/asjc/2100/2102 #Energy Engineering and Power Technology #/dk/atira/pure/subjectarea/asjc/2200/2208 #Electrical and Electronic Engineering
Tipo

contributionToPeriodical