DocumentCode :
3659541
Title :
Detecting the network attack vectors on SCADA systems
Author :
Ram Sandesh Ramachandruni;Prabaharan Poornachandran
Author_Institution :
Amrita Centre for Cyber Security, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India
fYear :
2015
Firstpage :
707
Lastpage :
712
Abstract :
Currently critical infrastructures such as SCADA systems are increasingly under threat, they often go unreported. There is a great need in addressing them. Today majority of the industries use these SCADA systems, so it is very critical to protect these systems. Attack on these systems could cause serious damage to the infrastructure and sometimes a threat to human life as well. As per date there are very few solutions to address SCADA security. So, it is important to take countermeasures against the attacks on these systems. In this paper we will analyze the use of honeypot systems in detecting the network attack vectors on SCADA systems. We will start by analyzing and testing various honeypot features which can help in providing additional security for SCADA systems. A Honeypot is built to mimic the services of an ICS; exposing them to the Internet, making them attractive for attackers and monitor the attackers activities. The goal is to model the attacking methodologies and suggest recommendations to make SCADA system secure.
Keywords :
"SCADA systems","Protocols","Internet","Reconnaissance","MIMICs","Monitoring"
Publisher :
ieee
Conference_Titel :
Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on
Print_ISBN :
978-1-4799-8790-0
Type :
conf
DOI :
10.1109/ICACCI.2015.7275694
Filename :
7275694
Link To Document :
بازگشت