SCADA Security: An Attack Tolerant Approach - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Infonomics Society International Journal of Industrial Control Systems Security Année : 2016

SCADA Security: An Attack Tolerant Approach

Résumé

To answer the cyber-attacks on SCADA (Supervisory Control and Data Acquisition) systems, we wonder whether an attack tolerant approach can be implemented. Indeed, the most of networked control system security mechanisms are based on detection and rejection of the cyber-attacks control data. This rejection is easy to be detected by the attackers. As a result, the attackers will continue to improving their strategy in order to break down the security mechanism. They try until they reach their goals, and generally, during this time, there is no indication about presence of cyber-attacks. In addition to specific algorithms such Data Encryption Standard (DES), Message Digest (MD5), timestamp, a new security mechanism based on the deception for the cyber-attacks is proposed. This mechanism, from a mathematical model of the plant, can make that the attackers believe that he has achieved the wished purpose, as they receive indication on their actions within the sensor reading. As a result, the attackers stop to improve their attack method. So, to answer the cyber-attacks on SCADA System, an attack tolerant approach is proposed.
Fichier non déposé

Dates et versions

hal-01413874 , version 1 (11-12-2016)

Identifiants

Citer

Amer Atta Yaseen, Mireille Bayart. SCADA Security: An Attack Tolerant Approach . Infonomics Society International Journal of Industrial Control Systems Security, 2016, 1 (1), pp.31-39. ⟨10.20533/ijicss.9781.9083.20346.2016.0004⟩. ⟨hal-01413874⟩
217 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More