Publication:
Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system

dc.citedby3
dc.contributor.authorQassim Q.S.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorZ'aba M.R.en_US
dc.contributor.authorKamarulzaman W.A.W.en_US
dc.contributor.authorid36613541700en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid24726154700en_US
dc.contributor.authorid6505975029en_US
dc.date.accessioned2023-05-29T08:13:30Z
dc.date.available2023-05-29T08:13:30Z
dc.date.issued2020
dc.descriptionComputer crime; Crime; Network security; SCADA systems; Critical infrastructure systems; Electrical power system; Industrial controls; Industrial processs; International standards; Malicious activities; Security vulnerabilities; Supervisory control and dataacquisition systems (SCADA); Electric power system controlen_US
dc.description.abstractSupervisory control and data acquisition (SCADA) system is the heart of almost every critical infrastructure system, whereby SCADA is generally employed in order to control and to monitor both the physical and industrial processes within these systems. It is, thus, of vital importance that any vulnerabilities of SCADA system to be identified and mitigated to prevent unplanned incidents, malicious activities, and cyber-attacks. The IEC 60870-5-104 refers to an international standard applied for tele-control in electrical engineering and power SCADA systems, which appears to be a significant principal protocol in electrical power system automation. Major industrial control vendors employ this protocol to monitor and to manage power utility devices. Nonetheless, IEC 60870-5-104 suffers from several designs and implementation weaknesses in terms of security aspects. As such, this study briefly presents this protocol and summarises its security vulnerabilities. Furthermore, it highlights the potential cyber-attacks based on the identified vulnerabilities. Additionally, the paper depicts several possible countermeasures to tighten the security of the SCADA systems. Copyright � 2020 Inderscience Enterprises Ltd.en_US
dc.description.natureFinalen_US
dc.identifier.doi10.1504/IJCIS.2020.107242
dc.identifier.epage106
dc.identifier.issue2
dc.identifier.scopus2-s2.0-85084925107
dc.identifier.spage91
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85084925107&doi=10.1504%2fIJCIS.2020.107242&partnerID=40&md5=c5dc841aadfcabc746be6742ba610e22
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/25731
dc.identifier.volume16
dc.publisherInderscience Publishersen_US
dc.sourceScopus
dc.sourcetitleInternational Journal of Critical Infrastructures
dc.titleAssessing the cyber-security of the IEC 60870-5-104 protocol in SCADA systemen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections