Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques
- 1 September 2016
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of convenience, it also increases their susceptibility to cyber-attacks. Given the potentially severe ramifications of exploiting SCADA systems, the purpose of this study is to utilize passive and active vulnerability assessment techniques to identify the vulnerabilities of Internet enabled SCADA systems. Specifically, we collect a large testbed of SCADA devices from Shodan, a search engine for the IoT, and assess their vulnerabilities with Nessus and against the National Vulnerability Database (NVD). Results of this study indicate that many SCADA systems from major vendors such as Rockwell Automation and Siemens are vulnerable to default credential, man-in-the-middle, and SSH exploit attacks.Keywords
This publication has 6 references indexed in Scilit:
- The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability PatchingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT)Published by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Cyber Security and Critical Energy InfrastructureThe Electricity Journal, 2014
- A survey SCADA of and critical infrastructure incidentsPublished by Association for Computing Machinery (ACM) ,2012
- SCADA security in the light of Cyber-WarfareComputers & Security, 2012
- Towards secure model for SCADA systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012