A review: towards practical attack taxonomy for industrial control systems

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Supervisory Control and Data Acquisition (SCADA) system is the underlying control system of most national critical infrastructures such as power, energy, water, transportation and telecommunication. In order to understand the potential threats to these infrastructures and the mechanisms to protect them, different types of cyber-attacks applicable to these infrastructures need to be identified. Therefore, there is a significant need to have a comprehensive understanding of various types of cyber-attacks and its classification associated with both Opera-tion Technology (OT) and Information Technology (IT). This paper presents a comprehensive review of existing cyber-attack taxonomies available in the literature and evaluates these taxonomies based on defined criteria.



  • Keywords

    SCADA; Cyber-Attack; Taxonomy.

  • References

      [1] Line MB, Zand A, Stringhini G & Kemmerer R (2014), Targeted attacks against industrial control systems: Is the power industry prepared? Proceedings of the ACM 2nd Workshop on Smart Energy Grid Security, pp. 13–22.

      [2] Johansson E, Sommestad T & Ekstedt M (2009), Issues of cyber security in scada-systems-on the importance of awareness. Proceedings of the IET 20th International Conference and Exhibition on Electricity Distribution-Part 1, pp. 1–4.

      [3] Fadul J, Hopkinson K, Sheffield C, Moore J & Andel T (2011), Trust management and security in the future communication-based" smart" electric power grid. Proceedings of the IEEE 44th Hawaii International Conference on System Sciences, pp. 1–10.

      [4] Dondossola G, Garrone F & Szanto J (2011), Cyber risk assessment of power control systems-A metrics weighed by attack experiments. Proceedings of the IEEE Power and Energy Society General Meeting, pp. 1–9.

      [5] Karnouskos S (2011), Stuxnet worm impact on industrial cyber-physical system security. Proceedings of the 37th Annual Conference on IEEE Industrial Electronics Society, pp. 4490–4494.

      [6] Howard JD & Longstaff TA (1998), a common language for computer security incidents. Technical report, California: Sandia National Labs.

      [7] Lough DL (2001), a taxonomy of computer attacks with applications to wireless networks. PhD thesis, Blacksburg: Virginia Polytechnic Institute and State University.

      [8] Hansman S & Hunt R (2005), a taxonomy of network and computer attacks. Computers and Security 24, 31–43.

      [9] Kjaerland M (2006), a taxonomy and comparison of computer security incidents from the commercial and government sectors. Computers and Security 25, 522–538.

      [10] Fleury T, Khurana H & Welch V (2008), towards a taxonomy of attacks against energy control systems. Proceedings of the International Conference on Critical Infrastructure Protection, pp. 71–85.

      [11] Meyers CA, Powers SS & Faissol DM (2009), Taxonomies of cyber adversaries and attacks: A survey of incidents and approaches. Technical report, California: Lawrence Livermore National Laboratory.

      [12] East S, Butts J, Papa M & Shenoi S (2009), A taxonomy of attacks on the DNP3 protocol. Proceedings of the International Conference on Critical Infrastructure Protection, pp. 67–81.

      [13] Zhu B, Joseph A & Sastry S (2011), A taxonomy of cyber-attacks on SCADA systems. Proceedings of the IEEE International Conference on Internet of Things and fourth International Conference on Cyber, Physical and Social Computing, pp. 380–388.

      [14] Miller B & Rowe D (2012), a survey SCADA of and critical infrastructure incidents. Proceedings of the ACM 1st Annual Conference on Research in Information Technology, pp. 51–56.

      [15] Li X, Liang X, Lu R, Shen X, Lin X & Zhu H (2012), Securing smart grid: Cyber-attacks, countermeasures, and challenges. IEEE Communications Magazine 50, 38–45.

      [16] Hashemi SM & Ardakani MR (2012), Taxonomy of the security aspects of cloud computing systems-A survey. International Journal of Applied Information Systems 4, 21–28.

      [17] Van Heerden RP, Irwin B, Burke ID & Leenen L (2012), a computer network attack taxonomy and ontology. International Journal of Cyber Warfare and Terrorism 2, 12–25.

      [18] Uma M & Padmavathi G (2013), a survey on various cyber-attacks and their classification. International Journal of Network Security 15, 390–396.

      [19] Jiang W, Tian ZH & Xiang CU (2013), DMAT: A new network and computer attack classification. Journal of Engineering Science and Technology Review 6, 101–106.

      [20] Hoque N, Bhuyan MH, Baishya RC, Bhattacharyya DK & Kalita JK (2014), Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications 40, 307–324.

      [21] Yampolskiy M, Horvath P, Koutsoukos XD, Xue Y & Sztipanovits J (2013), Taxonomy for description of cross-domain attacks on CPS. Proceedings of the second ACM International Conference on High Confidence Networked Systems, pp. 135–142.

      [22] Morris TH & GAO W (2013), Industrial control system cyber-attacks. Proceedings of the first International Symposium on ICS and SCADA Cyber Security Research, pp. 22–29.

      [23] Simmons C, Ellis C, Shiva S, Dasgupta D & Wu Q (2014), AVOIDIT: A cyber-attack taxonomy. Proceedings of the ninth Annual Symposium on Information Assurance, pp. 12–22.

      [24] Miller WB (2014), Classifying and cataloging cyber-security incidents within cyber-physical systems. Master thesis, Utah: Brigham Young University.




Article ID: 12815
DOI: 10.14419/ijet.v7i2.14.12815

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.