Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

S Samtani, S Yu, H Zhu, M Patton… - 2016 IEEE Conference …, 2016 - ieeexplore.ieee.org
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of
modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed …

A taxonomy of cyber attacks on SCADA systems

B Zhu, A Joseph, S Sastry - … conference on internet of things and …, 2011 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems are deeply ingrained in the
fabric of critical infrastructure sectors. These computerized real-time process control …

[HTML][HTML] SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues

M Alanazi, A Mahmood, MJM Chowdhury - Computers & security, 2023 - Elsevier
Supervisory control and data acquisition (SCADA) serves as the backbone of several critical
infrastructures, including water supply systems, oil pipelines, transportation and electricity. It …

Assessment of SCADA system vulnerabilities

G Yadav, K Paul - 2019 24th IEEE international conference on …, 2019 - ieeexplore.ieee.org
SCADA system is an essential component for automated control and monitoring in many of
the Critical Infrastructures (CI). Cyber-attacks like Stuxnet, Aurora, Maroochy on SCADA …

Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments

M El, E McMahon, S Samtani… - … on Intelligence and …, 2017 - ieeexplore.ieee.org
Cybersecurity is a critical concern in society today. One common avenue of attack for
malicious hackers is exploiting vulnerable websites. It is estimated that there are over one …

A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures

A Tesfahun, DL Bhaskari - Automatic Control and Computer Sciences, 2016 - Springer
Abstract Supervisory Control and Data Acquisition (SCADA) systems are widely used in
critical infrastructures such as water distribution networks, electricity generation and …

SCADA systems: vulnerabilities and remediation

JD Fernandez, AE Fernandez - Journal of Computing Sciences in …, 2005 - dl.acm.org
Supervisory Control and Data Acquisition, otherwise known as SCADA, is a system for
gathering real time data, controlling processes, and monitoring equipment from remote …

SCADA honeypots: An in-depth analysis of Conpot

A Jicha, M Patton, H Chen - 2016 IEEE conference on …, 2016 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) honeypots are key tools not only for
determining threats which pertain to SCADA devices in the wild, but also for early detection …

Developing a solid SCADA security strategy

J Pollet - 2nd ISA/IEEE Sensors for Industry Conference, 2002 - ieeexplore.ieee.org
This paper will discuss how the level of hacking has risen in recent years, and some of the
existing vulnerability assessments that have been recorded and discussed by several …

Attacking SCADA systems: A practical perspective

L Rosa, T Cruz, P Simões, E Monteiro… - 2017 IFIP/IEEE …, 2017 - ieeexplore.ieee.org
As Supervisory Control and Data Acquisition (SCADA) and Industrial and Automation
Control System (IACS) architectures became more open and interconnected, some of their …