Kyle Coffey
Vulnerability Analysis of Network Scanning on SCADA Systems
Coffey, Kyle; Smith, Richard; Maglaras, Leandros; Janicke, Helge
Authors
Abstract
Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructure environments for decades. With the demand for remote facilities to be controlled and monitored, industries have continued to adopt Internet technology into their ICS and SCADA systems so that their enterprise can span across international borders in order to meet the demand of modern living. Although this is a necessity, it could prove to be potentially dangerous. The devices that make up ICS and SCADA systems have bespoke purposes and are often inherently vulnerable and difficult to merge with newer technologies. The focus of this article is to explore, test, and critically analyse the use of network scanning tools against bespoke SCADA equipment in order to identify the issues with conducting asset discovery or service detection on SCADA systems with the same tools used on conventional IP networks. The observations and results of the experiments conducted are helpful in evaluating their feasibility and whether they have a negative impact on how they operate. This in turn helps deduce whether network scanners open a new set of vulnerabilities unique to SCADA systems.
Citation
Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018). Vulnerability Analysis of Network Scanning on SCADA Systems. Security and Communication Networks, 2018, Article 3794603. https://doi.org/10.1155/2018/3794603
Journal Article Type | Article |
---|---|
Acceptance Date | Feb 5, 2018 |
Online Publication Date | Mar 13, 2018 |
Publication Date | Mar 13, 2018 |
Deposit Date | Jan 5, 2023 |
Publicly Available Date | Jan 6, 2023 |
Journal | Security and Communication Networks |
Print ISSN | 1939-0114 |
Electronic ISSN | 1939-0122 |
Publisher | Wiley |
Peer Reviewed | Peer Reviewed |
Volume | 2018 |
Article Number | 3794603 |
DOI | https://doi.org/10.1155/2018/3794603 |
Keywords | Operating systems, Infrastructure, Network security, Scanners, Water treatment, Intellectual property, IP (Internet Protocol), Auditing, Internet Protocol, Internet crime, Remote monitoring, Supervisory control and data acquisition, Control systems, Network analysis, Industrial electronics, Scanning |
Public URL | http://researchrepository.napier.ac.uk/Output/2969522 |
Files
Vulnerability Analysis of Network Scanning on SCADA Systems
(3.4 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
Copyright Statement
CC BY 4.0
You might also like
Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV
(2025)
Presentation / Conference Contribution
A Blockchain-Powered Defence System Against DDoS Attacks with Incentivised Collaboration
(2025)
Presentation / Conference Contribution
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems
(2025)
Presentation / Conference Contribution
ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality
(2025)
Presentation / Conference Contribution
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search