Aerospace and Electronic Systems Magazine May 2017 - 31

Do et al.
IT systems in terms of the opportunity to damage physical infrastructure and to disrupt industrial facilities by cyber means.
Taking into account this distinct feature of SCADA systems,
terrorists may target safety-critical infrastructure using a computer network instead of an elaborate (and costly) physical attack. Documents devoted to training for cyber warfare relating
to national infrastructure have been found on al-Qaeda computers [49].

Nation-States
Nation-states are another threat to SCADA facilities. Highly capable organizations are able to acquire considerable resources
for deploying cyber attacks against SCADA systems [42]. For
example, the sophistication of the Stuxnet worm has led to some
speculation that it could have been created only with the sponsorship of a nation-state [50]. In addition, it is no surprise that most
armed forces are searching for new attack technologies, including cyber attacks against the safety-critical infrastructure of other
nations [41].

SCADA VULNERABILITIES
The investigation of SCADA vulnerabilities helps in understanding susceptible points and how they might be exploited for launching malicious attacks. The vulnerabilities of modern ICSs can be
broadly classified into four main categories [3]: architectural, security policy, software and hardware, and communication protocol
vulnerabilities.

Architectural Vulnerabilities
Modern SCADA architectures are not so different in principle
from those used in the 1980s and 1990s except that they have
moved from an isolated to an open environment. This advance
has, unfortunately, opened modern SCADA systems to various
types of cyber attacks. First, most SCADA networks are connected to their corporate network-they are thus more flexible
in terms of management. However, this flexibility leaves a backdoor for computer malware to enter the process network through
the enterprise network [46]. Second, numerous SCADA systems
use Web-based applications for monitoring physical processes.
This direct connection to the Internet could provide one possible
path for hackers to penetrate the process network. Third, local
access points could be another backdoor for malicious agents to
take control of field devices. Finally, adversaries can break into
the SCADA network through the connection with the vendor network [45].

Security Policy Vulnerabilities
Several standard software security procedures, such as delivering
a patch or updating the antivirus database, can affect SCADA systems. The utilization of several patches and antivirus software often 1) grants the process network access to the Internet, which may
expose the system to malicious agents, and 2) requires a system
reboot, which may lead to disruption. For example, a nuclear powMAY 2017

er plant was forced into an emergency shutdown after a software
update [51]. Therefore, it is preferable to use software patches and
update antivirus software rarely so as to keep the process network
as isolated as possible.

Software and Hardware Vulnerabilities
To respond to industrial requirements, SCADA systems have
become increasingly complex in both software and hardware.
It is inevitable that modern SCADA systems contain software
bugs and become vulnerable to hardware failures [52]. Typical
software bugs include [53]: buffer overflow, structured query
language (SQL) injection, and format string. For example, the
Slammer cyber incident [46], [54] was because of the vulnerabilities of the Microsoft structured query language (MS-SQL)
software. Moreover, SCADA systems are real-time operating
systems, making it difficult to implement traditional data encryption algorithms and consequently exposing the systems to integrity attacks.

Communication Protocol Vulnerabilities
Historically, with the idea in mind that SCADA systems would
be isolated from other networks, SCADA designers paid little
attention to security problems such as their integrity checking
mechanism, authentication mechanism, anti-repudiation mechanism, and anti-replay mechanism. Many SCADA communication
protocols, including Modbus, Distributed Network Protocol 3
(DNP3), and Allen-Bradley Ethernet/Internet Protocol (IP), lack
authentication features to prove the origin or the freshness of data
packets [55]. Hence, these systems are susceptible to denial-ofservice (DoS) attacks, man-in-the-middle attacks, and replay attacks.
Being implemented with proprietary communication protocols, traditional SCADA systems were thought to be secure. However, "security through obscurity" is not obvious in modern world.
IT has been evolving rapidly, leading to the adoption of standard
communication protocols [56] in most modern SCADA systems.
This evolution has reduced the isolation of SCADA systems from
the outside.

SCADA CYBER INCIDENTS
Numerous cyber incidents involving safety-critical infrastructures
have been documented over the last decades. These incidents have
raised significant concern about the security of SCADA systems,
especially after the Stuxnet incident in 2010. In the following, we
present in chronological order outstanding incidents that occurred
to ICSs.

Siberian Pipeline Explosion (1982)
The first cyber incident involving safety-critical infrastructures
might be counted as the explosion of a gas pipeline in Siberia in
1982 [32]. It was believed that a Trojan horse had been planted in
the SCADA system in charge of regulating the gas pipeline. By
changing the cooperation of pumps, turbines, and valves, the mali-

IEEE A&E SYSTEMS MAGAZINE

31



Table of Contents for the Digital Edition of Aerospace and Electronic Systems Magazine May 2017

No label
Aerospace and Electronic Systems Magazine May 2017 - No label
Aerospace and Electronic Systems Magazine May 2017 - Cover2
Aerospace and Electronic Systems Magazine May 2017 - 1
Aerospace and Electronic Systems Magazine May 2017 - 2
Aerospace and Electronic Systems Magazine May 2017 - 3
Aerospace and Electronic Systems Magazine May 2017 - 4
Aerospace and Electronic Systems Magazine May 2017 - 5
Aerospace and Electronic Systems Magazine May 2017 - 6
Aerospace and Electronic Systems Magazine May 2017 - 7
Aerospace and Electronic Systems Magazine May 2017 - 8
Aerospace and Electronic Systems Magazine May 2017 - 9
Aerospace and Electronic Systems Magazine May 2017 - 10
Aerospace and Electronic Systems Magazine May 2017 - 11
Aerospace and Electronic Systems Magazine May 2017 - 12
Aerospace and Electronic Systems Magazine May 2017 - 13
Aerospace and Electronic Systems Magazine May 2017 - 14
Aerospace and Electronic Systems Magazine May 2017 - 15
Aerospace and Electronic Systems Magazine May 2017 - 16
Aerospace and Electronic Systems Magazine May 2017 - 17
Aerospace and Electronic Systems Magazine May 2017 - 18
Aerospace and Electronic Systems Magazine May 2017 - 19
Aerospace and Electronic Systems Magazine May 2017 - 20
Aerospace and Electronic Systems Magazine May 2017 - 21
Aerospace and Electronic Systems Magazine May 2017 - 22
Aerospace and Electronic Systems Magazine May 2017 - 23
Aerospace and Electronic Systems Magazine May 2017 - 24
Aerospace and Electronic Systems Magazine May 2017 - 25
Aerospace and Electronic Systems Magazine May 2017 - 26
Aerospace and Electronic Systems Magazine May 2017 - 27
Aerospace and Electronic Systems Magazine May 2017 - 28
Aerospace and Electronic Systems Magazine May 2017 - 29
Aerospace and Electronic Systems Magazine May 2017 - 30
Aerospace and Electronic Systems Magazine May 2017 - 31
Aerospace and Electronic Systems Magazine May 2017 - 32
Aerospace and Electronic Systems Magazine May 2017 - 33
Aerospace and Electronic Systems Magazine May 2017 - 34
Aerospace and Electronic Systems Magazine May 2017 - 35
Aerospace and Electronic Systems Magazine May 2017 - 36
Aerospace and Electronic Systems Magazine May 2017 - 37
Aerospace and Electronic Systems Magazine May 2017 - 38
Aerospace and Electronic Systems Magazine May 2017 - 39
Aerospace and Electronic Systems Magazine May 2017 - 40
Aerospace and Electronic Systems Magazine May 2017 - 41
Aerospace and Electronic Systems Magazine May 2017 - 42
Aerospace and Electronic Systems Magazine May 2017 - 43
Aerospace and Electronic Systems Magazine May 2017 - 44
Aerospace and Electronic Systems Magazine May 2017 - 45
Aerospace and Electronic Systems Magazine May 2017 - 46
Aerospace and Electronic Systems Magazine May 2017 - 47
Aerospace and Electronic Systems Magazine May 2017 - 48
Aerospace and Electronic Systems Magazine May 2017 - 49
Aerospace and Electronic Systems Magazine May 2017 - 50
Aerospace and Electronic Systems Magazine May 2017 - 51
Aerospace and Electronic Systems Magazine May 2017 - 52
Aerospace and Electronic Systems Magazine May 2017 - 53
Aerospace and Electronic Systems Magazine May 2017 - 54
Aerospace and Electronic Systems Magazine May 2017 - 55
Aerospace and Electronic Systems Magazine May 2017 - 56
Aerospace and Electronic Systems Magazine May 2017 - 57
Aerospace and Electronic Systems Magazine May 2017 - 58
Aerospace and Electronic Systems Magazine May 2017 - 59
Aerospace and Electronic Systems Magazine May 2017 - 60
Aerospace and Electronic Systems Magazine May 2017 - 61
Aerospace and Electronic Systems Magazine May 2017 - 62
Aerospace and Electronic Systems Magazine May 2017 - 63
Aerospace and Electronic Systems Magazine May 2017 - 64
Aerospace and Electronic Systems Magazine May 2017 - Cover3
Aerospace and Electronic Systems Magazine May 2017 - Cover4
http://www.brightcopy.net/allen/aesm/34-2s
http://www.brightcopy.net/allen/aesm/34-2
http://www.brightcopy.net/allen/aesm/34-1
http://www.brightcopy.net/allen/aesm/33-12
http://www.brightcopy.net/allen/aesm/33-11
http://www.brightcopy.net/allen/aesm/33-10
http://www.brightcopy.net/allen/aesm/33-09
http://www.brightcopy.net/allen/aesm/33-8
http://www.brightcopy.net/allen/aesm/33-7
http://www.brightcopy.net/allen/aesm/33-5
http://www.brightcopy.net/allen/aesm/33-4
http://www.brightcopy.net/allen/aesm/33-3
http://www.brightcopy.net/allen/aesm/33-2
http://www.brightcopy.net/allen/aesm/33-1
http://www.brightcopy.net/allen/aesm/32-10
http://www.brightcopy.net/allen/aesm/32-12
http://www.brightcopy.net/allen/aesm/32-9
http://www.brightcopy.net/allen/aesm/32-11
http://www.brightcopy.net/allen/aesm/32-8
http://www.brightcopy.net/allen/aesm/32-7s
http://www.brightcopy.net/allen/aesm/32-7
http://www.brightcopy.net/allen/aesm/32-6
http://www.brightcopy.net/allen/aesm/32-5
http://www.brightcopy.net/allen/aesm/32-4
http://www.brightcopy.net/allen/aesm/32-3
http://www.brightcopy.net/allen/aesm/32-2
http://www.brightcopy.net/allen/aesm/32-1
http://www.brightcopy.net/allen/aesm/31-12
http://www.brightcopy.net/allen/aesm/31-11s
http://www.brightcopy.net/allen/aesm/31-11
http://www.brightcopy.net/allen/aesm/31-10
http://www.brightcopy.net/allen/aesm/31-9
http://www.brightcopy.net/allen/aesm/31-8
http://www.brightcopy.net/allen/aesm/31-7
https://www.nxtbookmedia.com