Vulnerability Assessment of Cyber Security for SCADA Systems

Supervisory control and data acquisition (SCADA) systems use programmable logic controllers (PLC) or other intelligent electronic devices (IED), remote terminal units (RTU) and input/output (I/O) devices to manage electromechanical equipment in either local or distributed environments. SCADA systems cover a range of industrial sectors and critical infrastructures such as water treatment and supply, electricity generation and distribution, oil refining, food production and logistics. Several factors have contributed to the escalation of risks specific to control systems, including the adoption of standardized technologies with known vulnerabilities, interconnectivity with other networks, use of insecure remote connections and widespread availability of technical information about control systems. This chapter discusses vulnerability assessment of SCADA systems, focusing on several aspects such as asset discovery, identification of vulnerabilities and threats, mitigation of attacks and presentation of major privacy issues.

[1]  Leandros A. Maglaras,et al.  Integrated OCSVM mechanism for intrusion detection in SCADA systems , 2014 .

[2]  Xuemin Shen,et al.  Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid , 2015, Secur. Commun. Networks.

[3]  Kevin Jones,et al.  A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..

[4]  Leandros A. Maglaras,et al.  An assessment of the application of IT security mechanisms to industrial control systems , 2017 .

[5]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[6]  Zahra Moravej,et al.  Secure SCADA communication by using a modified key management scheme. , 2013, ISA transactions.

[7]  Paul K. Kerr,et al.  The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability , 2010 .

[8]  Imad H. Elhajj,et al.  SCADA Intrusion Detection System based on temporal behavior of frequent patterns , 2014, MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference.

[9]  Dilip Patel,et al.  Assessing and augmenting SCADA cyber security: A survey of techniques , 2017, Comput. Secur..

[10]  Xiaohui Liang,et al.  PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.

[11]  Ray Fink LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS , 2006 .

[12]  Mercy Bere,et al.  Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS) , 2015, 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC).

[13]  Eric D. Knapp,et al.  Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems , 2011 .

[14]  Ernest Foo,et al.  DNP3 network scanning and reconnaissance for critical infrastructure , 2016, ACSW.

[15]  Luca Bruno,et al.  AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares , 2014, NDSS.

[16]  William H. Sanders,et al.  Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE) , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.

[17]  Ravishankar K. Iyer,et al.  Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.

[18]  Helge Janicke,et al.  SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..

[19]  Mohamed Amine Ferrag EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications , 2017, Telecommun. Syst..

[20]  Mohamed Amine Ferrag,et al.  A systematic review of data protection and privacy preservation schemes for smart grid communications , 2018 .

[21]  T.J. Overbye,et al.  SCADA Cyber Security Testbed Development , 2006, 2006 38th North American Power Symposium.

[22]  Mirjana D. Stojanovic,et al.  An Improved Risk Assessment Method for SCADA Information Security , 2014 .

[23]  Zahir Tari,et al.  PPFSCADA: Privacy preserving framework for SCADA data publishing , 2014, Future Gener. Comput. Syst..

[24]  Tai-hoon Kim,et al.  Improving SCADA control systems security with software vulnerability analysis , 2010 .

[25]  Athar Mahboob,et al.  Securing SCADA systems with open source software , 2013, 2013 High Capacity Optical Networks and Emerging/Enabling Technologies.

[26]  Robert Radvanovsky,et al.  Handbook of SCADA/Control Systems Security, Second Edition , 2016 .

[27]  Leandros A. Maglaras,et al.  Vulnerability Analysis of Network Scanning on SCADA Systems , 2018, Secur. Commun. Networks.

[28]  Yacov Y. Haimes,et al.  Risks of Terrorism to Information Technology and to Critical Interdependent Infrastructures , 2004 .

[29]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[30]  Yongge Wang,et al.  sSCADA: securing SCADA infrastructure communications , 2011, Int. J. Commun. Networks Distributed Syst..

[31]  Stefan Savage,et al.  You've Got Vulnerability: Exploring Effective Vulnerability Notifications , 2016, USENIX Security Symposium.

[32]  Jie Wu,et al.  An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.

[33]  Yi Yang,et al.  EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market , 2014, KSII Trans. Internet Inf. Syst..

[34]  Justin Varghese,et al.  Security issues in SCADA based industrial control systems , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).

[35]  Mauricio Papa,et al.  Passive Scanning in Modbus Networks , 2007, Critical Infrastructure Protection.

[36]  John S. Heidemann,et al.  Understanding passive and active service discovery , 2007, IMC '07.

[37]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[38]  Elaine Shi,et al.  Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[39]  Eul Gyu Im,et al.  Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems , 2012 .

[40]  Anirban Basu,et al.  Privacy-friendly secure bidding for smart grid demand-response , 2017, Inf. Sci..

[41]  Chen-Ching Liu,et al.  A PMU-based risk assessment framework for power control systems , 2013, 2013 IEEE Power & Energy Society General Meeting.

[42]  Ross J. Anderson,et al.  Optical Fault Induction Attacks , 2002, CHES.

[43]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[44]  Rafal Leszczyna,et al.  Cybersecurity and privacy in standards for smart grids - A comprehensive survey , 2018, Comput. Stand. Interfaces.

[45]  Zahir Tari,et al.  An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems , 2016, IEEE Transactions on Information Forensics and Security.

[46]  Parviz Keshavarzi,et al.  Advance hybrid key management architecture for SCADA network security , 2016, Secur. Commun. Networks.

[47]  Ahmed Ahmim,et al.  Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[48]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[49]  Xinghuo Yu,et al.  An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems , 2014, Comput. Secur..

[50]  Leandros A. Maglaras,et al.  Human behaviour as an aspect of cybersecurity assurance , 2016, Secur. Commun. Networks.

[51]  Kee-Choon Kwon,et al.  A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS , 2012 .

[52]  Farnam Jahanian,et al.  CANVuS: Context-Aware Network Vulnerability Scanning , 2010, RAID.

[53]  Rong Zheng,et al.  Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.

[54]  Leandros A. Maglaras,et al.  A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems , 2016, IEEE Transactions on Industrial Informatics.

[55]  Xiaohui Liang,et al.  SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing , 2014, Secur. Commun. Networks.

[56]  Man-Ki Yoon,et al.  A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems , 2017, ArXiv.

[57]  Rong Zheng,et al.  Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Syst. J..

[58]  Eric Wustrow,et al.  ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.

[59]  Nada Golmie,et al.  An integrated detection system against false data injection attacks in the Smart Grid , 2015, Secur. Commun. Networks.

[60]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[61]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[62]  D. Prince Winston,et al.  An enhanced optimization based algorithm for intrusion detection in SCADA network , 2017, Comput. Secur..

[63]  Wei Gao,et al.  On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.

[64]  Ajay Prasad,et al.  SCADA security issues and FPGA implementation of AES — A review , 2016, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT).

[65]  Mathias Ekstedt,et al.  Issues of cyber security in SCADA-systems - On the importance of awareness , 2009 .

[66]  K. McLaughlin,et al.  Multiattribute SCADA-Specific Intrusion Detection System for Power Networks , 2014, IEEE Transactions on Power Delivery.

[67]  Haider Abbas,et al.  Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.