Skip to main content

Modeling SCADA Attacks

  • Conference paper
  • First Online:
Book cover Smart Trends in Systems, Security and Sustainability

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 18))

Abstract

SCADA systems play a vital role in the efficient operations of the ports’ Critical Infrastructures (CIs) and their Maritime Logistics and Supply Chain Services (MLoSC). In this paper we provide a process-centric modeling approach using BPMN 2.0 specification in order to visualize an attack likely to be detected on SCADA systems. The SCADA model serves as a study on how security concepts (e.g. security paths, vulnerabilities, propagation of attacks) can be represented with modeling notations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    http://www.mitigateproject.eu/.

References

  1. Mattioli, R., Moulinos, K.: Analysis of ICS-SCADA cyber security maturity levels in critical sectors, European Union Agency for Network and Information Security (ENISA) (2015)

    Google Scholar 

  2. Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., Hahn, A.: Guide to industrial control systems (ICS) security, NIST, Special Publication 800-82 Rev.2 (2014)

    Google Scholar 

  3. Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Comput. Secur. 25, 498–506 (2006)

    Article  Google Scholar 

  4. Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: SCADA security in the light of Cyber-Warfare. Comput. Secur. 31, 418–436 (2012)

    Article  Google Scholar 

  5. The U.S. Department of Homeland Security/Office of Cyber and Infrastructure Analysis (DHS/OCIA): Consequences to seaport operations from malicious cyber activity, Critical Infrastructure Security and Resilience Note, Operational Analysis Division (2016)

    Google Scholar 

  6. Parfomak, P.W., Frittelli, J.: Maritime Security: Potential Terrorist Attacks and Protection Priorities, CRS report for Congress, Congressional Research Service (2007)

    Google Scholar 

  7. Daryabar, F., Dehghantanha, A., Udzir, N.I., Mohd Sani, N.F.B., Bin Shamsuddin, S.: Towards Secure Model for SCADA Systems. In: Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, pp. 60–64 (2012)

    Google Scholar 

  8. Papastergiou, S., Polemi, N., Papagiannopoulos, I.: Business and threat analysis of ports’ supply chain services. In: Tryfonas T., Askoxylakis I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 642–653 Springer Cham (2015)

    Google Scholar 

  9. Ma, Z., Smith, P.: Determining risks from advanced multi-step attacks to critical information infrastructures. In: Luiijf, E., Hartel, P. (eds.) CRITIS 2013. LNCS, vol. 8328, pp. 142–154. Springer Cham (2013)

    Google Scholar 

  10. Musman, S., Temin, A., Tanner, M., Fox, D., Pridemore, B.: Evaluating the impact of cyber attacks on missions. In: 5th European Conference on Information Management and Evaluation, ECIME 2011, pp. 446–456 (2011)

    Google Scholar 

  11. Braxton, M.O., Rowell, M.K., Butler, K.A., Haselkorn, M.: A Human-Centered Approach to Modeling Security Information and its Impact on Cargo Operations for Guidance in the Design of Interventions in the Information Sharing Environment, MODSIM World (2016). http://www.modsimworld.org

  12. Altuhhova, O., Matulevičius, R., Ahmed, N.: Towards Definition of Secure Business Processes. In: Bajec, M., Eder, J. (eds.) Advanced Information Systems Engineering Workshops, CAiSE 2012, LNBIP, vol. 112, pp. 1–15. Springer, Berlin, Heidelberg (2012)

    Google Scholar 

  13. Kosuri, K., Fjørtoft, K.E.: E-Collaboration for maritime operations using business process modeling. Int. J. Adv. Sci. Technol. 34, 101–112 SERSC (2011)

    Google Scholar 

  14. Meland, P.H., Gjære, E.A.: Representing threats in BPMN 2.0. In: 7th IEEE International Conference on Availability, Reliability & Security (ARES2012), pp. 524–550. IEEE (2012)

    Google Scholar 

Download references

Acknowledgements

This work has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653212 project MITIGATE and the Erasmus + project OMI-KA2 project. The authors also thank all partners of these projects. Finally, special thanks to the University of Piraeus, Research Center for its continuous support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eleni-Maria Kalogeraki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kalogeraki, EM., Polemi, N., Papastergiou, S., Panayiotopoulos, T. (2018). Modeling SCADA Attacks. In: Yang, XS., Nagar, A., Joshi, A. (eds) Smart Trends in Systems, Security and Sustainability. Lecture Notes in Networks and Systems, vol 18. Springer, Singapore. https://doi.org/10.1007/978-981-10-6916-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6916-1_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6915-4

  • Online ISBN: 978-981-10-6916-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics