Back to Results
First PageMeta Content
Industrial automation / Computer network security / Cyberwarfare / SCADA / DNP3 / Modbus / IEC 60870-6 / Stuxnet / Industrial control system / Technology / Automation / Telemetry


A Taxonomy of Cyber Attacks on SCADA Systems Bonnie Zhu, Anthony Joseph, Shankar Sastry Department of Electrical Engineering and Computer Sciences University of California at Berkeley, CA {bonniez,adj,sastry}@eecs.berkel
Add to Reading List

Document Date: 2011-09-21 18:45:10


Open Document

File Size: 319,64 KB

Share Result on Facebook

City

Stockholm / Washington / D.C. / Florence / Dalian / Chicago / /

Company

Secure Control Systems / Hercules / Computer Sciences / Intrusion Detection Systems / Wiley & Sons / Building Dependable Distributed Systems / Intrusion Detection/Prevention Systems / ISA Emerging Technologies / Symantec / Wind River Systems / Embedded Computing Systems / Intel / Microsoft / Cyber-Physical Systems / /

Continent

Asia / /

Country

China / Italy / Sweden / United States / /

/

Event

FDA Phase / /

Facility

Plant Floor / Electric Power Research Institute / Virginia Polytechnic Institute / Carnegie Mellon University / UDP port / British Columbia Institute of Technologys Internet Engineering Lab / Control Center Communications Protocol / Computer Sciences University of California at Berkeley / British Columbia Institute of Technology / State University / /

IndustryTerm

cyber security solutions / real-time system / level devices / control center network / transportation / command-and-control software / weak default hashing algorithm / legacy networks / Web application / process hardware / web accessibility / electricity pricing / connected interfaced device / real-time operating / continuous systems / soft real-time systems / real-time information exchange / control networks / application layer protocol / transmission control protocol/Internet protocol / target network / energy / real-time process control systems / control algorithm / estimation algorithms / control device / certain operating systems / remote devices / industrial networks / soft real-time systems leads / process control networks / electricity infrastructure enterprises / communication chain / industrial automation software / real-time systems / Internet reference model / security solutions / poor software design / detection systems / control algorithms / real time process data / soft real-time system / station control devices / industrial control systems / electric utilities / field devices / strength database applications / Wireless Networks / Internet connections / modified Internet Control message Protocol / transport protocols / data historian server / foreign intelligence services / servomechanical device / software applications / wireless technologies / networked field devices / Web attacks / relational database applications / control systems / corporate network / communication devices / live audio-video systems / communication network / conventional encryption block algorithms / wireless devices / remote device / /

NaturalFeature

mount SCADA / /

OperatingSystem

UNIX / VxWorks / Microsoft Windows / DoS / /

Organization

University of California / Polytechnic Institute / British Columbia Institute of Technologys Internet Engineering Lab / State University / Central Intelligence Agency / Department of Homeland Securitys / Carnegie Mellon University / Master Terminal Unit / United States Government Accountability Office / British Columbia Institute of Technology / National Science Foundation / Stateds Government Accountability Office / Electric Power Research Institute / ISO Transport Service / Emerging Technologies Conference / Instrumentation Systems and Automation Society / /

Person

Anthony Joseph / Shankar Sastry / Daniel Lough / Peter Baer Galvin / Ray Hunt / John D. Howard / Simon Hansman / Paul Kocher / Nicolas Falliere / Abraham Silberschatz / Octavio Nieto-Taladriz Garcia / Greg Gagne / Anand Raghunathan / Sunil Hattangady / Kevin S. Killourhy / Chun Man / Bonnie Zhu / Roy A. Maxion / Eric Byres / Kymie M. C. Tan / Joel Carter / Liam O Murchu / Amr Elramly / Stewart Baker / Victor K. Wei / Phil Muncaster / Natalia Filipiak / Marcelo Masera / Dan Hoffman / Katrina Timlin / Igor Nai Fovino / Mark Grimes / /

Position

first author / historian / central controller / compromised central serverl/controller / representative / controller historian / smart drive controller / controller / control engineer / /

Product

Achilles Vulnerability Test Platform / SQL injection / C-130 Hercules / C. SQL Injection / most / /

ProgrammingLanguage

SQL / C / /

ProvinceOrState

California / Ontario / /

Technology

TCP protocol / specific SCADA protocols / Information Technology / API / VxWorks / conventional encryption block algorithms / operating system / TCP/IP protocol / modified Internet Control message Protocol / transport protocols / application layer protocol / encryption / Real-time operating system / control algorithms / RPC-based protocol / SCADA protocol / weak default hashing algorithm / wireless technologies / Bluetooth / network operations center / LAN / RTOS system / relational database / wireless devices / UNIX / MAC address / control algorithm / SCADA protocols / UDP / operating systems / process control / TCP/IP / estimation algorithms / pdf / transmission control protocol/Internet protocol / Ethernet / edge device / DNS / controlling algorithms / RTOS / /

URL

http /

SocialTag