Skip to main content

Showing 1–1 of 1 results for author: Lev, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:1706.09303  [pdf, other

    cs.CR

    Stealthy Deception Attacks Against SCADA Systems

    Authors: Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev

    Abstract: SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values of the physical process. In this work we present a class of semantic network-based attacks against SCADA systems that are undetectable by the above… ▽ More

    Submitted 28 June, 2017; originally announced June 2017.