Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 6
Page No. 1338 - 1346

A Study on Security Vulnerabilities Assessment and Quantification in SCADA Systems

Authors : Zakuan Firdaus, Norziana Jamil, Qais Saif Qassim, Mohd Ezanee Rusli, Norhamadi Ja`affar, Maslina Daud and HafizahChe Hasan

References

Acunetix, 2016. Web server security and database security. Acunetix Ltd., London, UK. http://www.acunetix.com/websitesecurity/webserver-security/

Extreme Network, 2017. Security vulnerability in Apache web server-Struts2 bundled with ridgeline 4.0. Extreme Networks, San Jose, California, USA. https://gtacknowledge.extremenetworks.com/articles/Solution/Security-vulnerability-in-Apache-web-server-Struts2-bundled-with-Ridgeline-4-0

First.org., 2016. Common vulnerability scoring system v3.0: Specification document. Manchester, New Hampshire, USA. https://www.first.org/cvss/specification-document.

Graham-Cumming, J., 2016. Inside sheellshock: How hackers are using it to exploit system. Cloudflare, San Francisco, California, USA. https://blog.cloudflare.com/inside-shellshock/.

Igure, V.M., S.A. Laughter and R.D. Williams, 2006. Security issues in SCADA networks. Comput. Secur., 25: 498-506.
CrossRef  |  Direct Link  |  

Jonathan, P., CISSP, CAP. and PCIP., 2010. The dirty underbelly of SCADA and smart meters. Red Tiger Security, Houston, Texas. https://media.blackhat.com/bh-us-10/whitepapers/Pollet_Cummins/BlackHat-USA-2010-Pollet-Cummings-RTS-Electricity-for-Free-wp.pdf.

Lee, R.M., M.J. Assante and T. Conway, 2016. Analysis of the cyber attack on the Ukrainian power grid. E-ISAC, Washington, DC. https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf.

Mell, P., K. Scarfone and S. Romanosky, 2006. Common vulnerability scoring system. IEEE. Secur. Privacy, 4: 85-89.
CrossRef  |  Direct Link  |  

Miller, B. and D. Rowe, 2012. A survey SCADA of and critical infrastructure incidents. Proceedings of the 1st Annual Conference on Research in Information Technology, October 11-13, 2012, ACM, Calgary, Alberta, Canada, ISBN:978-1-4503-1643-9, pp: 51-56.

Robert, N.C., 2002. Port 80: Apache HTTP daemon exploit: In support of the cyber defense initiative GCIH practical assignment v2.1, option 2. GIAC, London. https://www.giac.org/paper/gcih/361/port-80-apache-http-daemon-exploit/103818.

Robles, J. and T. Kim, 2010. Architecture of wireless supervisory control and data acquisition system. Adv. Comput. Intell. Man Mach. Syst. Cybern. Venezuela, 2: 241-244.
Direct Link  |  

Robles, R.J., M.K. Choi, E.S. Cho, S.S. Kim and G.C. Park et al., 2008. Vulnerabilities in SCADA and critical infrastructure systems. Intl. J. Future Gener. Commun. Networking, 1: 99-104.
Direct Link  |  

Schneider Electric, 2012. SCADA systems, telemetry and remote SCADA solutions. Rueil-Malmaison, France. http://www.schneider-electric.com/solutions/ww/EN/med/20340568/application/pdf/1485_se-whitepaper-letter-scadaoverview-v005.pdf.

Sommestad, T., M. Ekstedt and H. Holm, 2013. The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures. IEEE. Syst. J., 7: 363-373.
CrossRef  |  Direct Link  |  

Stouffer, K., J. Falco and K. Scarfone, 2011. Guide to Industrial Control Systems (ICS) security. MBA Thesis, US Department of Commerce, National Institute of Standards and Technology, Gaithersburg, Maryland, USA.

Ten, C.W., C.C. Liu and G. Manimaran, 2008. Vulnerability assessment of cybersecurity for SCADA systems. IEEE. Trans. Power Syst., 23: 1836-1846.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved