首页> 外文会议>Distributech Conference Exhibition >Hijacking a Water Distribution Pump Station
【24h】

Hijacking a Water Distribution Pump Station

机译:劫持水分配泵站

获取原文

摘要

A large metropolitan water utility converted from manual/panel board and tone-telemetry gear to a radio and PLC based supervisory control (SCADA) system in the early 1990s. The system design and architecture employed was very much the "norm" for automation technology being provided by most vendors through the 1990s. During the installation and commissioning of the system, using laptop PC "test set" and protocol analyzer software, in combination with portable radio gear, it was discovered that the system could be "fooled" into accepting the test set as a "real" RTU site and that the RTU sites could be controlled by the test set, overriding the actual SCADA system. This (not unexpected) capability was very convenient for testing and commissioning purposes. But, after the events of 9/11, with the heightened concerns about "cyber security" this capability was rightly seen by the utility as a dangerous "cyber" weakness in the system. Unfortunately, this utility's concerns are similar to those of countless other utilities that have deployed equivalent automation technologies. This paper discusses the different approaches considered and actually taken, in an effort to make the pump stations (and other field facilities) less susceptible to potential cyber assaults.
机译:在20世纪90年代初,从手动/面板板和音调遥测齿轮转换为广播和PLC的监督控制(SCADA)系统转换。所采用的系统设计和架构是大多数供应商通过20世纪90年代提供的自动化技术的“规范”。在系统的安装和调试期间,使用笔记本电脑PC“测试”和协议分析仪软件,与便携式无线电装备结合,发现系统可以“被愚弄”接受测试设置为“真实”RTU网站并通过测试集可以控制RTU站点,覆盖实际的SCADA系统。这(不是意外)的能力对于测试和调试目的非常方便。但是,在9/11的事件之后,随着“网络安全”的提高,这种能力被实用性正确地看到了系统中的危险“网络”弱点。不幸的是,这种实用程序的疑虑与那些已经部署了等效自动化技术的无数其他实用程序的担忧。本文讨论了考虑和实际采取的不同方法,以便使泵站(和其他场所)易受潜在网络侵犯的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号