Title: An experimental investigation of malware attacks on SCADA systems
Citation: International Journal of Critical Infrastructure Protection vol. 2 no. 4 p. 139-145
Publisher: Elsevier
Publication Year: 2009
JRC N°: JRC48548
ISSN: 1874-5482
URI: http://www.elsevier.com/copyright
DOI: 10.1016/j.ijcip.2009.10.001
Type: Articles in periodicals and books
Abstract: Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into complex critical systems. Of particular interest are the set of vulnerabilities related to the communication protocols normally known as \Supervisory Control and Data Acquisition" (SCADA) protocols, under which fall those used to remotely control the RTU devices of industrial systems. In this paper we present the results of our research on the e®ects of \traditional" ICT malwares on SCADA systems. Moreover, we present a proof of concept of the potential e®ects of a set of computer malware speci¯cally designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.
JRC Directorate:Space, Security and Migration

Files in This Item:
There are no files associated with this item.

Items in repository are protected by copyright, with all rights reserved, unless otherwise indicated.