The Use of Attack Trees in Assessing Vulnerabilities in SCADA System

E.J. Byres, M. Franz and D. Miller ; "The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems", International Infrastructure Survivability Workshop (IISW'04), Institute of Electrical and Electronics Engineers, Lisbon, December 4, 2004

SCADA attack trees to determine vulnerabiltiesAbstract:  Protocol standards, particularly those in the controls and power industry, have traditionally been designed to address a specific application with little regard for security in their design or specification. At best, there has been only passing concern for security issues that may arise in deployment; at worst, protocol designers assume a closed (and therefore secure) environment, which, in many cases, no longer exists. Where security has been a consideration, there has been no clear methodology to assess the security risks in the protocol specification. This paper describes the application of attack tree methodology to the common SCADA protocol MODBUS/TCP with the goal of identifying security vulnerabilities inherent in the specification and in typical deployments.

PDF The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems - White Paper (272kb)