Please use this identifier to cite or link to this item:
|Title:||An experimental investigation of malware attacks on SCADA systems|
|Authors:||NAI FOVINO Igor; CARCANO Andrea; MASERA Marcelo; TROMBETTA Alberto|
|Citation:||International Journal of Critical Infrastructure Protection vol. 2 no. 4 p. 139-145|
|Type:||Articles in periodicals and books|
|Abstract:||Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into complex critical systems. Of particular interest are the set of vulnerabilities related to the communication protocols normally known as \Supervisory Control and Data Acquisition" (SCADA) protocols, under which fall those used to remotely control the RTU devices of industrial systems. In this paper we present the results of our research on the e®ects of \traditional" ICT malwares on SCADA systems. Moreover, we present a proof of concept of the potential e®ects of a set of computer malware speci¯cally designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.|
|JRC Directorate:||Space, Security and Migration|
Files in This Item:
There are no files associated with this item.
Items in repository are protected by copyright, with all rights reserved, unless otherwise indicated.