Forensic analysis of SCADA systems and networks

  • Authors:
  • T. Kilpatrick;J. Gonzalez;R. Chandia;M. Papa;S. Shenoi

  • Affiliations:
  • The University of Tulsa, Tulsa, Oklahoma 74104, USA.;The University of Tulsa, Tulsa, Oklahoma 74104, USA.;The University of Tulsa, Tulsa, Oklahoma 74104, USA.;The University of Tulsa, Tulsa, Oklahoma 74104, USA.;The University of Tulsa, Tulsa, Oklahoma 74104, USA

  • Venue:
  • International Journal of Security and Networks
  • Year:
  • 2008

Quantified Score

Hi-index 0.01

Visualization

Abstract

Supervisory Control and Data Acquisition (SCADA) systems are commonly used to automate and control industrial processes. Modern SCADA protocols leverage TCP/IP to transport sensor data and control signals. Also, corporate IT infrastructures now interconnect with previously isolated SCADA networks, raising serious security issues. This paper describes an architecture that supports the forensic analysis of SCADA systems and networks. The architecture is implemented in a prototype networked environment using the popular Modbus TCP protocol. In addition to supporting forensic investigations, the architecture incorporates mechanisms for monitoring process behaviour and analysing trends that can help improve plant performance.