Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system

IEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the mos...

Full description

Saved in:
Bibliographic Details
Main Authors: Qassim Q.S., Jamil N., Daud M., Ja'affar N., Yussof S., Ismail R., Kamarulzaman W.A.W.
Other Authors: 36613541700
Format: Article
Published: Science Publishing Corporation Inc 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-23959
record_format dspace
spelling my.uniten.dspace-239592023-05-29T14:53:32Z Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system Qassim Q.S. Jamil N. Daud M. Ja'affar N. Yussof S. Ismail R. Kamarulzaman W.A.W. 36613541700 36682671900 57193904391 57202007908 16023225600 15839357700 6505975029 IEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the most common attacks which has a catastrophic impact on industrial control systems is the control command injection attack. It happens when an attacker injects false control commands into a control system. This paper presents the IEC 60870-5-104 vulnera-bilities from the perspective of command and information data injection. From the SCADA testbed that we setup, we showed that a success-ful control command injection attack can be implemented by exploiting the vulnerabilities identified earlier. � 2018 Qais Saif Qassim et al. Final 2023-05-29T06:53:32Z 2023-05-29T06:53:32Z 2018 Article 2-s2.0-85080576204 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85080576204&partnerID=40&md5=70f8a29e2fa2d324c5171a739ea67684 https://irepository.uniten.edu.my/handle/123456789/23959 7 2.14 Special Issue 14 153 159 Science Publishing Corporation Inc Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description IEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the most common attacks which has a catastrophic impact on industrial control systems is the control command injection attack. It happens when an attacker injects false control commands into a control system. This paper presents the IEC 60870-5-104 vulnera-bilities from the perspective of command and information data injection. From the SCADA testbed that we setup, we showed that a success-ful control command injection attack can be implemented by exploiting the vulnerabilities identified earlier. � 2018 Qais Saif Qassim et al.
author2 36613541700
author_facet 36613541700
Qassim Q.S.
Jamil N.
Daud M.
Ja'affar N.
Yussof S.
Ismail R.
Kamarulzaman W.A.W.
format Article
author Qassim Q.S.
Jamil N.
Daud M.
Ja'affar N.
Yussof S.
Ismail R.
Kamarulzaman W.A.W.
spellingShingle Qassim Q.S.
Jamil N.
Daud M.
Ja'affar N.
Yussof S.
Ismail R.
Kamarulzaman W.A.W.
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
author_sort Qassim Q.S.
title Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
title_short Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
title_full Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
title_fullStr Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
title_full_unstemmed Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
title_sort simulating command injection attacks on iec 60870-5-104 protocol in scada system
publisher Science Publishing Corporation Inc
publishDate 2023
_version_ 1806426042425933824
score 13.222552