News Updates Sunday 19th May 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Monitoring and Detecting Security Attacks in Industrial Automation and Control System


Author : Bhagyashri Sangewar, Bimal Shah and Dr. A. R. Buchade

Pages : 1049-1052
Download PDF
Abstract

Industrial Automation and Control Systems (IACS) required to facilitate the safer means of information communication between smart devices such as various Intelligent Electronic Devices (IEDs). Security in Industrial Automation and Control Systems (IACS) is critical task as many of these devices are present in remote location and controlling critical plant processes. These IEDs and SCADA or other hosts uses various protocols such as Modbus, DNP3 etc. Here focus of work is to detect security attacks on IACS products. Protocols such as Modbus or basic DNP3 does not provide any security features. These creates opportunity for attacker to attack IACS devices using man in the middle, packet modification, eavesdropping types of attacks. Attack on any device is possible due to vulnerabilities in device itself or kind of protocols used. It is important to understand such communication protocols so that we can understand how attacker can affect communication mechanism to attack the device. Here as a reference we have considered Distributed network protocol version 3 (DNP3) which is nonproprietary protocol used in Supervisory Control and Data Acquisition (SCADA) system. DNP3-SA provides authentication mechanism which ensures the integrity and confidentiality between communicating devices. However, it may need to detect attacks if attacker can breach the defense mechanism of the protocol. The purpose of this project to detect attacks. This can be done by monitoring network packet of given protocol (which is DNP3 in this case) as well as by monitoring various system information. Network packets can help us to prevent the attacks while system information can be utilized to identify attack as soon as attack has taken place.

Keywords: Industrial Automation and Control Systems, SCADA, DNP3 protocol, Secure authentication, Security

Call for Papers
  1. IJCET- May/June 2024 Issue

    Submission Last Date
    30 June 2024
  2. DOI is given to all articles
  3. Current Issue
  4. IJTT-June-2024
  5. IJAIE-June-2024
  6. IJCSB-June-2024
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved