A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation
It is an established fact that the security of Industrial Automation and Control Systems (IACS) strongly depends on the robustness of the underlying supervisory control and data acquisition (SCADA) network protocols (among other factors). This becomes especially evident when considering the extent t...
Main Authors: | Luis Rosa, Miguel Freitas, Sergey Mazo, Edmundo Monteiro, Tiago Cruz, Paulo Simoes |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8672892/ |
Similar Items
-
Development of secure architectures for process control systems
by: Yan A. Sukhikh, et al.
Published: (2020-06-01) -
Cyber Security in Industrial Control Systems and SCADA Applications: Modbus TCP Protocol Example
by: Erdal IRMAK, et al.
Published: (2018-03-01) -
HONEYPOT – To bee or not to bee: A study of attacks on ICS/SCADA systems.
by: Albinsson, Felix, et al.
Published: (2021) -
SCADA AND SECURITY DISPATCHES ACCORDING TO PRESENT LEGISLATION IN ROMANIA
by: Cristian Silviu BANACU, et al.
Published: (2014-11-01) -
PROPOSAL OF POLLED-CSMA PROTOCOL FOR AN AD HOC SCADA SYSTEM
by: Yuxiang, Yang, et al.
Published: (2000)