Please use this identifier to cite or link to this item:
http://dspace2020.uniten.edu.my:8080/handle/123456789/10536
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Qassim, Q.S. | en_US |
dc.contributor.author | Jamil, N. | en_US |
dc.contributor.author | Daud, M. | en_US |
dc.contributor.author | Ja'affar, N. | en_US |
dc.contributor.author | Yussof, S. | en_US |
dc.contributor.author | Ismail, R. | en_US |
dc.contributor.author | Kamarulzaman, W.A.W. | en_US |
dc.date.accessioned | 2018-11-07T08:11:34Z | - |
dc.date.available | 2018-11-07T08:11:34Z | - |
dc.date.issued | 2018 | - |
dc.description.abstract | IEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the most common attacks which has a catastrophic impact on industrial control systems is the control command injection attack. It happens when an attacker injects false control commands into a control system. This paper presents the IEC 60870-5-104 vulnera-bilities from the perspective of command and information data injection. From the SCADA testbed that we setup, we showed that a success-ful control command injection attack can be implemented by exploiting the vulnerabilities identified earlier. © 2018 Qais Saif Qassim et al. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | International Journal of Engineering and Technology(UAE) Volume 7, Issue 2.14 Special Issue 14, 2018, Pages 153-159 | en_US |
dc.title | Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system | en_US |
dc.type | Article | en_US |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | none | - |
item.openairetype | Article | - |
Appears in Collections: | COE Scholarly Publication |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.