首页> 外文会议>IEEE International Conference on Intelligence and Security Informatics >Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques
【24h】

Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

机译:使用被动和主动漏洞评估技术识别SCADA漏洞

获取原文

摘要

Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of convenience, it also increases their susceptibility to cyber-attacks. Given the potentially severe ramifications of exploiting SCADA systems, the purpose of this study is to utilize passive and active vulnerability assessment techniques to identify the vulnerabilities of Internet enabled SCADA systems. Specifically, we collect a large testbed of SCADA devices from Shodan, a search engine for the IoT, and assess their vulnerabilities with Nessus and against the National Vulnerability Database (NVD). Results of this study indicate that many SCADA systems from major vendors such as Rockwell Automation and Siemens are vulnerable to default credential, man-in-the-middle, and SSH exploit attacks.
机译:诸如发电厂,炼油厂和污水处理等关键基础设施是现代社会的核心。监督控制和数据采集(SCADA)系统旨在允许操作员监督,维护和控制关键基础设施。近年来,SCADA系统与Internet的连接性有所增加。尽管这种连接提供了更高的便利性,但同时也增加了其对网络攻击的敏感性。考虑到利用SCADA系统可能产生的严重后果,本研究的目的是利用被动和主动漏洞评估技术来识别启用Internet的SCADA系统的漏洞。具体来说,我们从物联网搜索引擎Shodan收集了一个大型的SCADA设备测试平台,并利用Nessus和国家漏洞数据库(NVD)评估了它们的漏洞。这项研究的结果表明,来自罗克韦尔自动化和西门子等主要供应商的许多SCADA系统都容易受到默认证书,中间人和SSH攻击的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号