Text size
  • Small
  • Medium
  • Large
  • Standard
  • Blue text on blue
  • High contrast (Yellow text on black)
  • Blue text on beige

    Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks

    2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)

    St Pölten, Austria, 11-12 September 2014


    Peter Maynard, Kieran McLaughlin & Berthold Haberler



    This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.


    PDF file PDF Version of this Paper 1,276(kb)

    ICS-CSR 2014: International Symposium for ICS & SCADA Cyber Security Research cover

    Print copies of ICS-CSR 2014
    ISBN 978-1-78017-286-6
    RRP £85

    Available from the BCS bookshop