Our detailed analysis of the Modbus Serial and TCP protocol
specifications with respect to threats, control system targets
and attack entry points has facilitated the identification of
attacks and their categorization within attack taxonomies.
The analysis of the protocols, while thorough, is certainly
not comprehensive. Indeed, we believe that many attacks are
yet to be theorized. Nevertheless, the numbers of attacks and
attack instances discovered are much higher than expected.
Even more surprising is the large proportion of highimpact
attacks, especially those involving the interruption,
modification and fabrication of control system assets.
We hope that our work will inspire renewed efforts at
characterizing attacks on Modbus and other SCADA protocols.
The results will help clarify the nature and scope of the
threats facing critical infrastructure assets. Also, they will
support formal risk analysis and risk mitigation strategies as
well as the design and deployment of next generation SCADA
protocols that are secure, reliable and resilient.
Our detailed analysis of the Modbus Serial and TCP protocolspecifications with respect to threats, control system targetsand attack entry points has facilitated the identification ofattacks and their categorization within attack taxonomies.The analysis of the protocols, while thorough, is certainlynot comprehensive. Indeed, we believe that many attacks areyet to be theorized. Nevertheless, the numbers of attacks andattack instances discovered are much higher than expected.Even more surprising is the large proportion of highimpactattacks, especially those involving the interruption,modification and fabrication of control system assets.We hope that our work will inspire renewed efforts atcharacterizing attacks on Modbus and other SCADA protocols.The results will help clarify the nature and scope of thethreats facing critical infrastructure assets. Also, they willsupport formal risk analysis and risk mitigation strategies aswell as the design and deployment of next generation SCADAprotocols that are secure, reliable and resilient.
การแปล กรุณารอสักครู่..
