The use of attack trees in assessing vulnerabilities in SCADA systems. Byres, E. J., Franz, M., & Miller, D. In Proceedings of the International Infrastructure Survivability Workshop, of IISW'04, Lisbon, Portugal, December, 2004. Citeseer. 00098
The use of attack trees in assessing vulnerabilities in SCADA systems [link]Paper  abstract   bibtex   
Protocol standards, particularly those in the controls and power industry, have traditionally been designed to address a specific application with little regard for security in their design or specification. At best, there has been only passing concern for security issues that may arise in deployment; at worst, protocol designers assume a closed (and therefore secure) environment, which, in many cases, no longer exists. Where security has been a consideration, there has been no clear methodology to assess the security risks in the protocol specification. This paper describes the application of attack tree methodology to the common SCADA protocol MODBUS/TCP with the goal of identifying security vulnerabilities inherent in the specification and in typical deployments.

Downloads: 0