Please use this identifier to cite or link to this item: https://hdl.handle.net/10316/101586
DC FieldValueLanguage
dc.contributor.authorRosa, Luís-
dc.contributor.authorFreitas, Miguel-
dc.contributor.authorMazo, Sergey-
dc.contributor.authorMonteiro, Edmundo-
dc.contributor.authorCruz, Tiago-
dc.contributor.authorSimões, Paulo-
dc.date.accessioned2022-09-01T09:28:32Z-
dc.date.available2022-09-01T09:28:32Z-
dc.date.issued2019-
dc.identifier.issn2169-3536pt
dc.identifier.urihttps://hdl.handle.net/10316/101586-
dc.description.abstractIt is an established fact that the security of Industrial Automation and Control Systems (IACS) strongly depends on the robustness of the underlying supervisory control and data acquisition (SCADA) network protocols (among other factors). This becomes especially evident when considering the extent to which certain protocols, designed with poor or nonexistent security mechanisms, have led to a considerable number of past incident reports affecting critical infrastructures and essential services. Considering the current situation, it is rather obvious why the proper auditing and analysis of SCADA protocols are considered as key when it comes to design and/or protect IACS infrastructures. However, while the security of some protocols, such as Modbus or DNP3, has already been extensively analyzed, the same cannot be said for other protocols and technologies being used in the same domain that have not received the same amount of attention. In this paper, we provide a comprehensive security analysis of the PCOM SCADA protocol, including a dissection of PCOM, a demonstration of several attacks scenarios on PCOM-based systems, and also an analysis of possible mitigation strategies against these potential attacks. Moreover, this paper also describes a number of open-source tools that we developed for further analysis and research of PCOM security aspects, including a PCOM Wireshark dissector, a Nmap NSE PCOM scan, multiple Metasploit PCOM modules, a set of Snort PCOM rules, and several network traf c datasets containing multiple samples of different types of PCOM operations.pt
dc.language.isoengpt
dc.relationATENA H2020 EU Project (H2020-DS-2015-1 Project) under Grant 700581pt
dc.rightsopenAccesspt
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt
dc.subjectSCADApt
dc.subjectsecuritypt
dc.subjectPCOMpt
dc.subjectICSpt
dc.subjectIACSpt
dc.titleA Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigationpt
dc.typearticle-
degois.publication.firstPage42156pt
degois.publication.lastPage42168pt
degois.publication.titleIEEE Accesspt
dc.peerreviewedyespt
dc.identifier.doi10.1109/ACCESS.2019.2906926pt
degois.publication.volume7pt
dc.date.embargo2019-01-01*
uc.date.periodoEmbargo0pt
item.openairetypearticle-
item.fulltextCom Texto completo-
item.languageiso639-1en-
item.grantfulltextopen-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
crisitem.author.researchunitCISUC - Centre for Informatics and Systems of the University of Coimbra-
crisitem.author.researchunitCISUC - Centre for Informatics and Systems of the University of Coimbra-
crisitem.author.researchunitCISUC - Centre for Informatics and Systems of the University of Coimbra-
crisitem.author.parentresearchunitFaculty of Sciences and Technology-
crisitem.author.parentresearchunitFaculty of Sciences and Technology-
crisitem.author.parentresearchunitFaculty of Sciences and Technology-
crisitem.author.orcid0000-0002-8230-4045-
crisitem.author.orcid0000-0003-1615-2925-
crisitem.author.orcid0000-0001-9278-6503-
crisitem.author.orcid0000-0002-5079-8327-
Appears in Collections:I&D CISUC - Artigos em Revistas Internacionais
Files in This Item:
Show simple item record

SCOPUSTM   
Citations

16
checked on Nov 17, 2022

WEB OF SCIENCETM
Citations

14
checked on May 2, 2023

Page view(s)

96
checked on Jul 17, 2024

Download(s)

300
checked on Jul 17, 2024

Google ScholarTM

Check

Altmetric

Altmetric


This item is licensed under a Creative Commons License Creative Commons