Two Decades of SCADA Exploitation: A Brief History

05/21/2019
by   Simon Duque Anton, et al.
0

Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970's, the term SCADA emerged, describing the automated control and data acquisition. Since most industrial and automation networks were physically isolated, security was not an issue. This changed, when in the early 2000's industrial networks were opened to the public internet. The reasons were manifold. Increased interconnectivity led to more productivity, simplicity and ease of use. It decreased the configuration overhead and downtimes for system adjustments. However, it also led to an abundance of new attack vectors. In recent time, there has been a remarkable amount of attacks on industrial companies and infrastructures. In this paper, known attacks on industrial systems are analysed. This is done by investigating the exploits that are available on public sources. The different types of attacks and their points of entry are reviewed in this paper. Trends in exploitation as well as targeted attack campaigns against industrial enterprises are introduced.

READ FULL TEXT
research
05/24/2019

Devil in the Detail: Attack Scenarios in Industrial Applications

In the past years, industrial networks have become increasingly intercon...
research
05/28/2019

Putting Together the Pieces: A Concept for Holistic Industrial Intrusion Detection

Besides the advantages derived from the ever present communication prope...
research
02/10/2020

Cybersecurity for Industrial Control Systems: A Survey

Industrial Control System (ICS) is a general term that includes supervis...
research
10/26/2020

Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments

Due to increasing digitalization, formerly isolated industrial networks,...
research
02/19/2021

PCaaD: Towards Automated Determination and Exploitation of Industrial Processes

Over the last decade, Programmable Logic Controllers (PLCs) have been in...
research
12/09/2018

ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries

The security of Industrial Control Systems (ICS) has been attracting inc...
research
09/29/2021

Con tingent Valuation Method (CVM) f or Agricultural Wastes in Greece

This paper focuses on investigating the tendency of farmers in the great...

Please sign up or login with your details

Forgot password? Click here to reset