Critical State-Based Filtering System for Securing SCADA Network Protocols
#1

Abstract

The security of System Control and Data Acquisition (SCADA) systems is one of the most pressing subjects in industrial systems, particularly for those installations actively using the public network in order to provide new features and services. In this paper, we present an innovative approach to the design of filtering systems based on the state analysis of the system being monitored. The aim is to detect attacks composed of a set of “SCADA” commands that, while licit when considered in isolation on a single-packet basis, can disrupt the correct behavior of the system when executed in particular operating states. The proposed firewall detects these complex attacks thanks to an internal representation of the controlled SCADA system. Furthermore, we detail the design of the architecture of the firewall for systems that use the ModBus and DNP3 protocols, and the implementation of a prototype, providing experimental comparative results that confirm the validity of the proposed approach.
Reply
#2

The security of SCADA systems (Data Control and Acquisition System) is one of the most pressing issues in industrial systems, particularly for those facilities that actively use the public network to offer new features and services. In this article we present an innovative approach to the design of filtering systems based on the analysis of the state of the system being monitored. The goal is to detect attacks consisting of a set of "SCADA" commands that, while licit when considered in isolation in a single packet, can disrupt the correct behaviour of the system when executed in particular operating states. The proposed firewall detects these complex attacks thanks to an internal representation of the controlled SCADA system. In addition, we detail the firewall architecture design for systems using the ModBus and DNP3 protocols and the implementation of a prototype, providing experimental comparative results that confirm the validity of the proposed approach.

SCADA (monitoring control and data acquisition) is a type of industrial control system (ICS). It is a centralised system that monitors and controls the industrial processes that exist in the physical world. They work on Master - Slave basis. This system is widely used in power plants, semaphore control, power plants, etc., since it is a centralised data storage system, there is a possibility that the attackers to hack the information. In the existing system, a special filtering system is used that acts as a firewall for the SCADA network. The system is prevented from hackers by analysing the state of the system. It involves predicting whether the system is close to the critical state. The problem is that only the hacker's attack is prevented. No problem is identified in the PLC (Programmable Logic Controller) software. There is no protection against unintentional errors or code-level and other attacks. Some errors will only show one warning, the user will ignore the warning and load the malicious code on the server thus affecting the entire system. We focus on software vulnerabilities in ladder logic; A popular graphical language for programmable logic controllers. We show how intentional or unintentional errors in ladder logic code can lead to integrity and availability violations. We propose methods to support the safe development of code of programmable logic controllers and to detect vulnerable applications.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: abstract of securing topology maintenance protocols for sensor networks, scada network, seminar topics on communication network and protocols, network communication protocols, critical event monitoring in wireless sensor network, network protocols, securing topology maintenance protocols for sensor networks uml diagrams,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Exploring the design space of social network-based Sybil defenses 1 904 15-02-2017, 02:55 PM
Last Post: jaseela123d
  Content-based image retrieval (CBIR) System project topics 15 13,688 13-05-2016, 02:30 PM
Last Post: dhanabhagya
  Development of a workflow based Complaint Management System (where the complaints are mechanical engineering crazy 5 5,596 28-08-2015, 04:59 AM
Last Post: AlbertFak
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 1,305 14-07-2015, 02:11 PM
Last Post: seminar report asees
  Web Based Blood Bank Management System project report maker 4 12,590 18-04-2015, 07:12 PM
Last Post: Guest
  MOBILE PHONE BASED ATTENDANCE TRACKING SYSTEM seminarsonly 25 20,919 06-03-2015, 07:18 PM
Last Post: unas
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,248 19-09-2014, 12:52 AM
Last Post: [email protected]
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 3,022 03-06-2013, 11:13 AM
Last Post: computer topic
  The Wireless Sensor Network for Home-Care System Using ZigBee smart paper boy 1 1,967 31-01-2013, 11:34 AM
Last Post: seminar details
  Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Projects9 1 1,441 08-01-2013, 02:25 PM
Last Post: Guest

Forum Jump: