Identifying and Scoring Vulnerability in SCADA Environments

Supervisory Control and Data Acquisition (SCADA) systems form a critical component to industries such as national power grids, manufacturing automation, nuclear power production and more. By interacting with control machines and providing real-time support to monitor, gather, and record data, SCADA systems show major impact in industrial environments. Along with the uncountable benefits of SCADA systems, inconceivable risks have raised. Moreover, SCADA operators, production staff and sometimes systems experts have no or little knowledge when applying security due diligence. In this paper, we systematically review SCADA security based on different aspects (i.e. SCADA components, vulnerability, severity, impact, etc.). Our goal is to provide an all-inclusive reference for future SCADA users and researchers. We also use a time-based heuristic approach to evaluate vulnerabilities and show the importance of the evaluation. We aim to establish a fundamental level of security due diligence to ensure SCADA risks are wellcomprehended and managed. Keywords—Supervisory Control and Data Acquisition (SCADA) security; critical infrastructure security; SCADA; risk assessment; vulnerability scoring

[1]  Yacov Y. Haimes,et al.  Hierarchical Holographic Modeling , 1981, IEEE Transactions on Systems, Man, and Cybernetics.

[2]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[3]  Yacov Y Haimes,et al.  Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[4]  Herbert J. Mattord,et al.  Principles of Information Security , 2004 .

[5]  Yacov Y. Haimes,et al.  Risks of Terrorism to Information Technology and to Critical Interdependent Infrastructures , 2004 .

[6]  Mark A. Turnquist,et al.  Assessing the performance of interdependent infrastructures and optimizing investments , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[7]  Shamkant B. Navathe,et al.  A Management Perspective on Risk of Security Threats to Information Systems , 2005, Inf. Technol. Manag..

[8]  Yacov Y. Haimes,et al.  Journal of Homeland Security and Emergency Management A Roadmap for Quantifying the Efficacy of Risk Management of Information Security and Interdependent , 2011 .

[9]  W. Granzer,et al.  Security in networked building automation systems , 2006, 2006 IEEE International Workshop on Factory Communication Systems.

[10]  Jack Wiles Supervisory Control and Data Acquisition , 2008 .

[11]  Carlo Bellettini,et al.  Combating Memory Corruption Attacks On Scada Devices , 2008, Critical Infrastructure Protection.

[12]  Sujeet Shenoi,et al.  A Taxonomy of Attacks on the DNP3 Protocol , 2009, Critical Infrastructure Protection.

[13]  Igor Nai Fovino,et al.  Design and Implementation of a Secure Modbus Protocol , 2009, Critical Infrastructure Protection.

[14]  Raul Aquino-Santos,et al.  Emerging Technologies in Wireless Ad-hoc Networks: Applications and Future Development , 2010 .

[15]  Georgios Loukas,et al.  Protection Against Denial of Service Attacks: A Survey , 2010, Comput. J..

[16]  David G. Holmberg,et al.  BACnet wide area network security threat assessment , 2011 .

[17]  S. Shankar Sastry,et al.  A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[18]  Dale C. Rowe,et al.  A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.

[19]  Helge Janicke,et al.  SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..

[20]  Jian Guan,et al.  Chapter 4 – A Digraph Model for Risk Identification and Management in SCADA Systems , 2013 .

[21]  Prabaharan Poornachandran,et al.  Detecting the network attack vectors on SCADA systems , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[22]  Federica Pascucci,et al.  Communications network analysis in a SCADA system testbed under cyber-attacks , 2015, 2015 23rd Telecommunications Forum Telfor (TELFOR).

[23]  Zhao Yan,et al.  The Study of Security Issues for the Industrial Control Systems Communication Protocols , 2015 .

[24]  Kevin Jones,et al.  A Forensic Taxonomy of SCADA Systems and Approach to Incident Response , 2015, ICS-CSR.

[25]  Daniel Krauss,et al.  Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures , 2016, 2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).

[26]  Elias Bou-Harb Passive inference of attacks on SCADA communication protocols , 2016, 2016 IEEE International Conference on Communications (ICC).