首页> 外文会议>IEEE International Conference on Intelligence and Security Informatics >Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques
【24h】

Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

机译:使用被动和活动漏洞评估技术识别SCADA漏洞

获取原文

摘要

Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of convenience, it also increases their susceptibility to cyber-attacks. Given the potentially severe ramifications of exploiting SCADA systems, the purpose of this study is to utilize passive and active vulnerability assessment techniques to identify the vulnerabilities of Internet enabled SCADA systems. Specifically, we collect a large testbed of SCADA devices from Shodan, a search engine for the IoT, and assess their vulnerabilities with Nessus and against the National Vulnerability Database (NVD). Results of this study indicate that many SCADA systems from major vendors such as Rockwell Automation and Siemens are vulnerable to default credential, man-in-the-middle, and SSH exploit attacks.
机译:主要基础设施,如发电厂,炼油厂和污水,是现代社会的核心。监督控制和数据采集(SCADA)系统旨在允许人工运营商监督,维护和控制关键基础设施。近年来,SCADA系统对互联网连接的增加。虽然这种连接提供了增加的便利水平,但它也增加了对网络攻击的易感性。鉴于利用SCADA系统的潜在严重的后果,本研究的目的是利用被动和积极的漏洞评估技术来识别支持互联网的SCADA系统的漏洞。具体而言,我们收集Shodan的SCADA设备的大型测试平台,Shodan,Shodan,一个用于物联网的搜索引擎,并评估与Nessus和国家漏洞数据库(NVD)的漏洞。该研究的结果表明,来自罗克韦尔自动化和西门子等主要供应商的许多SCADA系统都容易受到默认凭证,中间人和SSH利用攻击的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号