• DocumentCode
    628245
  • Title

    Towards secure monitoring and control systems: Diversify!

  • Author

    Cotroneo, Domenico ; Pecchia, Antonio ; Russo, S.

  • Author_Institution
    Dipt. di Ing. Elettr. e delle Tecnol. dell´Inf. (DIETI), Univ. degli Studi di Napoli Federico II, Naples, Italy
  • fYear
    2013
  • fDate
    24-27 June 2013
  • Firstpage
    1
  • Lastpage
    2
  • Abstract
    Cyber attacks have become surprisingly sophisticated over the past fifteen years. While early infections mostly targeted individual machines, recent threats leverage the widespread network connectivity to develop complex and highly coordinated attacks involving several distributed nodes [1]. Attackers are currently targeting very diverse domains, e.g., e-commerce systems, corporate networks, datacenter facilities and industrial systems, to achieve a variety of objectives, which range from credentials compromise to sabotage of physical devices, by means of smarter and smarter worms and rootkits. Stuxnet is a recent worm that well emphasizes the strong technical advances achieved by the attackers´ community. It was discovered in July 2010 and firstly affected Iranian nuclear plants [2]. Stuxnet compromises the regular behavior of the supervisory control and data acquisition (SCADA) system by reprogramming the code of programmable logic controllers (PLC). Once compromised, PLCs can progressively destroy a device (e.g., components of a centrifuge, such as the case of the Iranian plant) by sending malicious control signals. Stuxnet combines a relevant number of challenging features: it exploits zero-days vulnerabilities of the Windows OS to affect the nodes connected to the PLC; it propagates either locally (e.g., by means of USB sticks) or remotely (e.g., via shared folders or the print spooler vulnerability); it is able to modify its behavior during the progression of the attack, and communicates with a remote command and control server. More importantly, Stuxnet can remain undetected for many months [3] because it is able to fool the SCADA system by emulating regular monitoring signals.
  • Keywords
    SCADA systems; computerised monitoring; invasive software; programmable controllers; PLC code reprogramming; SCADA system; Stuxnet; Windows OS; cyber attacks; malicious control signals; network connectivity; programmable logic controllers; remote command and control server; secure control systems; secure monitoring systems; supervisory control and data acquisition system; zero-day vulnerabilities; Monitoring; Proposals; SCADA systems; Security; Sensors; Smart grids;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Dependable Systems and Networks (DSN), 2013 43rd Annual IEEE/IFIP International Conference on
  • Conference_Location
    Budapest
  • ISSN
    1530-0889
  • Print_ISBN
    978-1-4673-6471-3
  • Type

    conf

  • DOI
    10.1109/DSN.2013.6575341
  • Filename
    6575341