Publication Type:

Conference Paper

Source:

2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, Institute of Electrical and Electronics Engineers Inc., p.707-712 (2015)

ISBN:

9781479987917

URL:

http://www.scopus.com/inward/record.url?eid=2-s2.0-84946239280&partnerID=40&md5=695b6f7dceed8fbe292742b200c88c74

Keywords:

Computer crime, Honeypots, Human lives, IDS, Information science, Integrated circuits, Intelligent control, IPS, Network attack, SCADA, SCADA security, SCADA systems

Abstract:

Currently critical infrastructures such as SCADA systems are increasingly under threat, they often go unreported. There is a great need in addressing them. Today majority of the industries use these SCADA systems, so it is very critical to protect these systems. Attack on these systems could cause serious damage to the infrastructure and sometimes a threat to human life as well. As per date there are very few solutions to address SCADA security. So, it is important to take countermeasures against the attacks on these systems. In this paper we will analyze the use of honeypot systems in detecting the network attack vectors on SCADA systems. We will start by analyzing and testing various honeypot features which can help in providing additional security for SCADA systems. A Honeypot is built to mimic the services of an ICS; exposing them to the Internet, making them attractive for attackers and monitor the attackers activities. The goal is to model the attacking methodologies and suggest recommendations to make SCADA system secure. © 2015 IEEE.

Notes:

cited By 0; Conference of International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015 ; Conference Date: 10 August 2015 Through 13 August 2015; Conference Code:115835

Cite this Research Publication

R. S. Ramachandruni and Poornachandran, P., “Detecting the network attack vectors on SCADA systems”, in 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, 2015, pp. 707-712.