Publication:
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system

dc.citedby7
dc.contributor.authorQassim Q.S.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorDaud M.en_US
dc.contributor.authorJa'affar N.en_US
dc.contributor.authorYussof S.en_US
dc.contributor.authorIsmail R.en_US
dc.contributor.authorKamarulzaman W.A.W.en_US
dc.contributor.authorid36613541700en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid57193904391en_US
dc.contributor.authorid57202007908en_US
dc.contributor.authorid16023225600en_US
dc.contributor.authorid15839357700en_US
dc.contributor.authorid6505975029en_US
dc.date.accessioned2023-05-29T06:53:32Z
dc.date.available2023-05-29T06:53:32Z
dc.date.issued2018
dc.description.abstractIEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the most common attacks which has a catastrophic impact on industrial control systems is the control command injection attack. It happens when an attacker injects false control commands into a control system. This paper presents the IEC 60870-5-104 vulnera-bilities from the perspective of command and information data injection. From the SCADA testbed that we setup, we showed that a success-ful control command injection attack can be implemented by exploiting the vulnerabilities identified earlier. � 2018 Qais Saif Qassim et al.en_US
dc.description.natureFinalen_US
dc.identifier.epage159
dc.identifier.issue2.14 Special Issue 14
dc.identifier.scopus2-s2.0-85080576204
dc.identifier.spage153
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85080576204&partnerID=40&md5=70f8a29e2fa2d324c5171a739ea67684
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/23959
dc.identifier.volume7
dc.publisherScience Publishing Corporation Incen_US
dc.sourceScopus
dc.sourcetitleInternational Journal of Engineering and Technology(UAE)
dc.titleSimulating command injection attacks on IEC 60870-5-104 protocol in SCADA systemen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections