Loading [MathJax]/extensions/MathMenu.js
Network security analysis SCADA system automation on industrial process | IEEE Conference Publication | IEEE Xplore

Network security analysis SCADA system automation on industrial process


Abstract:

Supervisory Control and Data Acquisition (SCADA) is a unit control system that has been used almost in various industries around the world in terms of process automation....Show More

Abstract:

Supervisory Control and Data Acquisition (SCADA) is a unit control system that has been used almost in various industries around the world in terms of process automation. This system delineates the real infrastructure and provides ease in operations and monitoring, but this system has vulnerability in the security aspects of data communications connected between SCADA support devices. This can have a major impact on industry and the economy. This research was conducted by designing and building SCADA infrastructure and analyzing vulnerability threats to SCADA network security. This research penetrates SCADA network using Kali Linux and data traffic analysis on SCADA network using Wireshark. From the results of Wireshark analysis got the attacker with User Anonymous. Analysis performed with normal and abnormal data traffic conditions. The result of this research is penetration of SCADA network using Kali Linux, which is used to attack and make data traffic between Programable Logic Controller (PLC) with Human Machine Interface (HMI) becomes solid, and result from penetration testing, SCADA system become down due of data traffic on a dense network, thereby indicating that SCADA networks are vulnerable to malware threats and attacks, the results of this study are recommendations and network security strategy SCADA system.
Date of Conference: 21-23 November 2017
Date Added to IEEE Xplore: 01 February 2018
ISBN Information:
Conference Location: Jakarta, Indonesia

I. Introduction

Supervisory control and data acquisition (SCADA) [1] is a control system architecture that uses computers with network-based data communications used for high-level process control management. Interfaces that allow monitoring and commands, such as set point data changes, display the measurement results of the instruments in the field. This real time control is performed by sensors and actuators in the field connected to the module through the network [2]. SCADA controls many important infrastructure such as power grids, water treatment systems, nuclear power plants, controlling raw materials of a production process [3]. SCADA system is a very attractive target among cyber crime and hackers because this system controls the critical infrastructure that greatly affects the economy of a country or industry [2]. Consequences of cyber attacks could have an impact on SCADA System infrastructure damage, as controls are not controlled by the system, but are controlled by cyber. SCADA consists of Programmable Logic Controllers (PLCs), Human Machinery Interface (HMI), instrument measurement sensors in the field and other supporting devices [2], [4]. In older systems, SCADA components connect using a special network so that the SCADA system is assumed to be secure. But with technological developments [4] [5] demanding standardization of protocols so that all devices from various vendors can be used. Standard protocols generally use the Transfer Control Protocol (TCP) Internet Protocol (IP). Under certain conditions SCADA systems require connecting to the internet to obtain licenses and software updates from vendors. With TCP / IP-based SCADA network conditions and connected to the internet, the system becomes vulnerable and gets threats from outside parties.

Contact IEEE to Subscribe

References

References is not available for this document.