Meeting Security Challenges of SCADA Alecia Copeland-Barrett, Steven Stefano, Stephanie Menoscal Paula Hernandez-Medina, Xinchen Yi, Nadia Walker and Charles Tappert Seidenberg School of Computer Science and Information Systems Pace University Pleasantville, NY 10570, USA Email:
[email protected] and fss80137p, sm47236p, ph79486p, xy79419p, nw18485p,
[email protected] Abstract—Supervisory Control and Data Acquisition (SCADA) systems capture data from network facilities and sends com- mands to a control feature (automated or staffed) where the physical process creates a feedback control loop. The dynamic nature of SCADA information reflects a high degree of common variance in these areas: wasted resources, network inefficiencies, physical damage, and lost revenues. Poorly managed system data can amplify missed opportunities for users to discover changes embedded within essential operations. Attackers can access simple remote devices such as a fingerprint scanner to learn specific information. The team investigated the practicality of identifying the targeted devices with machine learning. The Fig. 1. ConEd Exposure group provided insights into the important role cryptography plays to secure system links. The sample dataset was an accurate reflection of the monitor and control information associated with elementary gas pipeline field devices. This specific set was are legal requirements to produce and deliver continuous, safe provided by Oak Ridge National Laboratories (ORNL). Our services to customers. group utilized Waikato Environment for Knowledge Analysis Cyber attacks on natural gas SCADA systems are increasing (WEKA) and ORANGE to analyze the ORNL gas pipeline dataset. This data was an insightful vehicle to explore assorted in the utility industry. In 2014 BlackEnergy attackers released types of threats common to Industrial Control Systems (ICS).