Text size
  • Small
  • Medium
  • Large
Contrast
  • Standard
  • Blue text on blue
  • High contrast (Yellow text on black)
  • Blue text on beige

    Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape

    2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)

    St Pölten, Austria, 11-12 September 2014

    AUTHORS

    Antoine Lemay, Marina Krotofil, José M. Fernandez & Scott Knight

    ABSTRACT

    http://dx.doi.org/10.14236/ewic/ics-csr2014.11

    There are almost as many ways to implement Industrial Control Systems as there are ways to control industrial systems. This produces a wide-varying range of possible architectures for the SCADA networks that control them. This paper organizes SCADA networks based on these various control architectures in order to evaluate how different controlmodels and architectures can affect the threat model.We observe that distributed control, with control logic in the endpoints, is more susceptible to attacks on SCADA endpoints and that distributed state architectures,with centralized control, ismore susceptible to attacks on the SCADA master.

    PAPER FORMATS

    PDF file PDF Version of this Paper 585(kb)

    ICS-CSR 2014: International Symposium for ICS & SCADA Cyber Security Research cover

    Print copies of ICS-CSR 2014
    ISBN 978-1-78017-286-6
    RRP £85

    Available from the BCS bookshop