Skip to main content

Securing SCADA Critical Network Against Internal and External Threats

Short Paper

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10242))

  • 1821 Accesses

Abstract

Supervisory control and data acquisition systems (SCADA) constitute the sensitive part of the critical infrastructures. Any successful malicious incident could cause material, human and economic damages. Thus, the security of the SCADA networks became an emergency requirement to keep the continuity of services against hostile and cyber terrorist security risks. Several studies were conducted to secure SCADA networks against internal or external threats. In this paper, we focused on protection against both internal and external threats by adopting security mechanisms as access control, availability, authentication and integrity using a secure communication protocol ModbusSec and an intelligent firewall . We adopt also the self-healing and the intrusion tolerance techniques so in case of an intrusion in the system; it will have no impact on the continuity of service and the network safety.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gao, J., Liu, J., Rajan, B., Nori, R., Fu, B., Xiao, Y., Philip Chen, C.L.: SCADA communication and security issues. Sec. Commun. Netw. 7(1), 175–194 (2014)

    Article  Google Scholar 

  2. Psaier, H., Dustdar, S.: A survey on self-healing systems: approaches and systems. Computing 91(1), 43–73 (2011)

    Article  Google Scholar 

  3. Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.: Secure cryptography testbed implementation for SCADA protocols security. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 315–320. IEEE, December 2013

    Google Scholar 

  4. Shahzad, A., Xiong, N., Irfan, M., Lee, M., Hussain, S., Khaltar, B.: A SCADA intermediate simulation platform to enhance the system security. In: 2015 17th International Conference on Advanced Communication Technology (ICACT), pp. 368–373. IEEE, July 2015

    Google Scholar 

  5. Kim, B.K., Kang, D.H., Na, J.C., Chung, T.M.: Detecting abnormal behavior in SCADA networks using normal traffic pattern learning. In: Park, J., Stojmenovic, I., Jeong, H., Yi, G. (eds.) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol. 330, pp. 121–126. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-45402-2_18

    Google Scholar 

  6. Pramod, T.C., Sunitha, N.R.: An approach to detect malicious activities in SCADA systems. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1–7. IEEE, July 2013

    Google Scholar 

  7. Sousa, P., Bessani, A.N., Dantas, W.S., Souto, F., Correia, M., Neves, N.F.: Intrusion-tolerant self-healing devices for critical infrastructure protection. In: IEEE/IFIP International Conference on Dependable Systems & Networks, DSN 2009, pp. 217–222. IEEE, June 2009

    Google Scholar 

  8. Hayes, G., El-Khatib, K.: Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol. In: 2013 Third International Conference on Communications and Information Technology (ICCIT), pp. 179–184. IEEE, June 2013

    Google Scholar 

  9. Chen, Q., Abdelwahed, S.: Towards realizing self-protecting SCADA systems. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference, pp. 105–108. ACM, April 2014

    Google Scholar 

  10. Blangenois, J., Guemkam, G., Feltus, C., Khadraoui, D.: Organizational security architecture for critical infrastructure. In: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), pp. 316–323. IEEE, September 2013

    Google Scholar 

  11. Ghosh, D., Sharman, R., Raghav Rao, H., Upadhyaya, S.: Self-healing systems—survey and synthesis. Decis. Support Syst. 42(4), 2164–2185 (2007)

    Article  Google Scholar 

  12. Panja, B., Oros, J., Britton, J., Meharia, P., Pati, S.: Intelligent gateway for SCADA system security: a multi-layer attack prevention approach. In: 2015 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA), pp. 1–6. IEEE, June 2015

    Google Scholar 

  13. Ameziane El Hassani, A., Abou El Kalam, A., Bouhoula, A., Abbassi, R., Ait Ouahman, A.: Integrity-OrBAC: a new model to preserve critical infrastructures integrity. Int. J. Inf. Secur. 14(4), 369–385 (2014). https://doi.org/10.1007/s10207-014-0254-9

    Google Scholar 

  14. Abou El Kalam, A., Baina, A., Deswarte, Y., Kaaniche, M.: PolyOrBAC: a security framework for critical infrastructures. Int. J. Crit. Infrastruct. Prot. (IJCIP) 2(4), 154–169 (2009). https://doi.org/10.1016/j.ijcip.2009.08.005

    Article  Google Scholar 

  15. Veríssimo, P., Neves, Nuno F., Correia, M., Deswarte, Y., Abou El Kalam, A., Bondavalli, A., Daidone, A.: The CRUTIAL architecture for critical information infrastructures. In: de Lemos, R., Di Giandomenico, F., Gacek, C., Muccini, H., Vieira, M. (eds.) WADS 2007. LNCS, vol. 5135, pp. 1–27. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85571-2_1

    Chapter  Google Scholar 

  16. Deswarte, Y.: Comment peut-on tolérer les Intrusions sur Internet? Revue de l’électricité et de l’électronique 8, 83–90 (2003)

    Article  Google Scholar 

  17. Huitsing, P., Chandia, R., Papa, M., Shenoi, S.: Attack taxonomies for the modbus protocol. Int. J. Crit. Infrastruc. Prot. 1, 37–44 (2008)

    Article  Google Scholar 

  18. Bhatia, S., et al.: Practical modbus flooding attack and detection. In: 2014 Proceedings of the ACSW-AISC, pp. 20–13 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mounia El Anbal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

El Anbal, M., Abou El Kalam, A., Benhadou, S., Moutaouakkil, F., Medromi, H. (2017). Securing SCADA Critical Network Against Internal and External Threats. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science(), vol 10242. Springer, Cham. https://doi.org/10.1007/978-3-319-71368-7_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71368-7_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71367-0

  • Online ISBN: 978-3-319-71368-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics