A Survey of Security Challenges in Cloud-Based SCADA Systems
Abstract
:1. Introduction
2. Background
2.1. Traditional SCADA Systems Architecture
2.2. Cloud-Based SCADA System Architecture
- The hardware layer, located within data centers, consists of essential physical components such as processors, memory, storage, and bandwidth.
- The infrastructure layer introduces virtualization and provides infrastructure as a service (IaaS), featuring a pool of virtual machines (VMs) that host SCADA applications and can be provisioned on demand to IT users.
- The platform layer builds upon the infrastructure services to offer platform as a service (PaaS), enabling software development and delivery over the web, and
- The software layer delivers ready-to-use software and applications, meeting various business needs and providing software as a service (SaaS) by utilizing the platform layer’s components and services.
3. Research Methodology
- English peer-reviewed studies: We prioritized articles published in well-respected, peer-reviewed journals, conference proceedings, and book chapters. This ensures the reliability and academic integrity of the information presented.
- Relevance to cloud-based SCADA systems: We selected articles based on their focus on security issues specifically related to cloud-based SCADA systems. We carefully reviewed abstracts, keywords, and conclusions to determine the direct relevance of each study to our research topic.
- Recency of publication: Given the rapidly evolving nature of cybersecurity, we gave preference to articles published within the last five to seven years. This helped ensure that the findings and discussions in our review reflect the current challenges and solutions in the field, and
- Citation count and impact factor: we also considered the citation count and the publishing journal’s impact factor as indicators of the article’s influence and relevance to the academic community in the field of cybersecurity.
4. Cloud-Based SCADA Systems Vulnerabilities
4.1. SCADA Systems and Cloud Service Connectivity
4.2. Shared Infrastructure
4.3. Malicious Insiders
4.4. SCADA Protocols Security
5. Cyberattacks of Cloud-Based SCADA Systems
5.1. Hardware Attacks
5.2. Software Attacks
5.2.1. ICS Attacks
5.2.2. Vulnerabilities-Based Attacks
5.2.3. Cloud-Specific Attacks
5.3. Communication and Protocol-Specific Attacks
5.4. Control Process Attacks
5.5. Insider Attacks
6. Cyberattack Tactics
7. Cloud-Based SCADA Systems Security
8. Discussion and Conclusions
- Implementing real-time security monitoring systems that can adapt to new and evolving threats, which can, in turn, reduce the window of opportunity for attackers.
- Having a robust incident response plan that can be quickly and effectively enacted in the event of a security breach.
- Performing regular, comprehensive security audits, including vulnerability scanning and penetration testing, to uncover potential security gaps.
- Developing robust security frameworks for IoT devices integrated into SCADA systems to ensure these devices do not become entry points for attackers.
- Enhancing the security of the supply chain by working closely with vendors and partners to ensure they adhere to high-security standards.
- Improving awareness and training among the workforce to prevent security breaches due to human error or insider threats, and
- Engaging in collaborations for threat intelligence sharing, which can aid in the quicker identification and response to new threats.
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Morsey, C. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure; Robert Morris University: Pittsburgh, PA, USA, 2017. [Google Scholar]
- Yadav, G.; Paul, K. Architecture and security of SCADA systems: A review. Int. J. Crit. Infrastruct. Prot. 2021, 34, 100433. [Google Scholar] [CrossRef]
- Cai, N.; Wang, J.; Yu, X. SCADA system security: Complexity, history and new developments. In Proceedings of the 2008 6th IEEE International Conference on Industrial Informatics, Daejeon, Republic of Korea, 13–16 July 2008; pp. 569–574. [Google Scholar]
- Stojanović, M.D.; Boštjančič-Rakas, S.V.; Marković-Petrović, J.D. SCADA systems in the cloud and fog environments: Migration scenarios and security issues. Facta Univ.-Ser. Electron. Energetics 2019, 32, 345–358. [Google Scholar] [CrossRef]
- Buyya, R.; Yeo, C.S.; Venugopal, S. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications, Dalian, China, 25–27 September 2008; pp. 5–13. [Google Scholar]
- Mushtaq, M.F.; Akram, U.; Khan, I.; Khan, S.N.; Shahzad, A.; Ullah, A. Cloud computing environment and security challenges: A review. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 183–195. [Google Scholar]
- Tariq, N.; Asim, M.; Khan, F.A. Securing SCADA-based critical infrastructures: Challenges and open issues. Procedia Comput. Sci. 2019, 155, 612–617. [Google Scholar] [CrossRef]
- Church, P.; Mueller, H.; Ryan, C.; Gogouvitis, S.V.; Goscinski, A.; Haitof, H.; Tari, Z. SCADA systems in the Cloud. In Handbook of Big Data Technologies; Springer: Berlin/Heidelberg, Germany, 2017; pp. 691–718. [Google Scholar]
- El Mrabet, Z.; Kaabouch, N.; El Ghazi, H.; El Ghazi, H. Cyber-security in smart grid: Survey and challenges. Comput. Electr. Eng. 2018, 67, 469–482. [Google Scholar] [CrossRef]
- Church, P.; Mueller, H.; Ryan, C.; Gogouvitis, S.V.; Goscinski, A.; Haitof, H.; Tari, Z. Moving SCADA systems to IaaS clouds. In Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), Chengdu, China, 19–21 December 2015; pp. 908–914. [Google Scholar]
- Wilhoit, K. SCADA in the Cloud; Trend Micro: Cupertino, CA, USA, 2013; p. 5. [Google Scholar]
- Yi, M.; Mueller, H.; Yu, L.; Chuan, J. Benchmarking cloud-based SCADA system. In Proceedings of the 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Hong Kong, China, 11–14 December 2017; pp. 122–129. [Google Scholar]
- Bhamare, D.; Zolanvari, M.; Erbad, A.; Jain, R.; Khan, K.; Meskin, N. Cybersecurity for industrial control systems: A survey. Comput. Secur. 2020, 89, 101677. [Google Scholar] [CrossRef]
- Alakbarov, R.; Hashimov, M. Development of Security Mechanisms in Cloud Based SCADA Systems. In Proceedings of the 2023 5th International Conference on Problems of Cybernetics and Informatics (PCI), Baku, Azerbaijan, 28–30 August 2023; pp. 1–4. [Google Scholar]
- Sajid, A.; Abbas, H.; Saleem, K. Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access 2016, 4, 1375–1384. [Google Scholar] [CrossRef]
- Maglaras, L.; Ferrag, M.; Derhab, A.; Mukherjee, M.; Janicke, H.; Rallis, S. Threats, countermeasures and attribution of cyber attacks on critical infrastructures. EAI Endorsed Trans. Secur. Saf. 2018, 5, e1. [Google Scholar] [CrossRef]
- Pliatsios, D.; Sarigiannidis, P.; Lagkas, T.; Sarigiannidis, A.G. A survey on SCADA systems: Secure protocols, incidents, threats and tactics. IEEE Commun. Surv. Tutor. 2020, 22, 1942–1976. [Google Scholar] [CrossRef]
- Ghosh, S.; Sampalli, S. A survey of security in SCADA networks: Current issues and future challenges. IEEE Access 2019, 7, 135812–135831. [Google Scholar] [CrossRef]
- Combs, L. Cloud computing for SCADA. Control Eng. 2011, 58, 22–26. [Google Scholar]
- Byers, C. Fog Computing for Industrial Automation. 2018. Available online: https://www.controleng.com/articles/fog-computing-for-industrial-automation/ (accessed on 1 March 2024).
- Nugent, E. How Cloud and Fog Computing will Advance SCADA Systems. Manuf. Autom. 2017, 32, 22–24. [Google Scholar]
- Howard, P. A Security Checklist for SCADA Systems in the Cloud. 2015. Available online: https://www.route-fifty.com/infrastructure/2015/06/a-security-checklist-for-scada-systems-in-the-cloud/287164/ (accessed on 15 April 2022).
- Mesbah, M.; Elsayed, M.S.; Jurcut, A.D.; Azer, M. Analysis of ICS and SCADA Systems Attacks Using Honeypots. Future Internet 2023, 15, 241. [Google Scholar] [CrossRef]
- Rakas, S.V.B.; Stojanović, M.D.; Marković-Petrović, J.D. A review of research work on network-based scada intrusion detection systems. IEEE Access 2020, 8, 93083–93108. [Google Scholar] [CrossRef]
- Nazir, S.; Patel, S.; Patel, D. Cloud-based autonomic computing framework for securing SCADA systems. In Innovations, Algorithms, and Applications in Cognitive Informatics and Natural Intelligence; IGI Global: Hershey, PA, USA, 2020; pp. 276–297. [Google Scholar]
- Cerullo, G.; Mazzeo, G.; Papale, G.; Sgaglione, L.; Cristaldi, R. A Secure Cloud-Based SCADA Application: The Use Case of a Water Supply Network. In Proceedings of the International Conference on New Trends in Intelligent Software Methodology Tools and Techniques (SoMeT 16), Larnaca, Cyprus, 12–14 September 2016; pp. 291–301. [Google Scholar]
- Ulltveit-Moe, N.; Nergaard, H.; Erdödi, L.; Gjøsæter, T.; Kolstad, E.; Berg, P. Secure information sharing in an industrial Internet of Things. arXiv 2016, arXiv:1601.04301. [Google Scholar]
- Rashid, A.; Gardiner, J.; Green, B.; Craggs, B. Everything is awesome! Or is it? Cyber security risks in critical infrastructure. In Proceedings of the International Conference on Critical Information Infrastructures Security, Linköping, Sweden, 23–25 September 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 3–17. [Google Scholar]
- McLaughlin, S.; Konstantinou, C.; Wang, X.; Davi, L.; Sadeghi, A.R.; Maniatakos, M.; Karri, R. The cybersecurity landscape in industrial control systems. Proc. IEEE 2016, 104, 1039–1057. [Google Scholar] [CrossRef]
- Common Vulnerabilities and Exposures, “CVE-2011-2367”. SUSE. Available online: https://www.suse.com/ko-kr/security/cve/CVE-2011-2367.html (accessed on 30 February 2022).
- Irmak, E.; Erkek, İ. An overview of cyber-attack vectors on SCADA systems. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; pp. 1–5. [Google Scholar]
- Chromik, J.J.; Remke, A.; Haverkort, B.R. Improving SCADA security of a local process with a power grid model. In Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research, Belfast, UK, 23–25 August 2016; pp. 114–123. [Google Scholar]
- Daneels, A.; Salter, W. What is SCADA? In Proceedings of the International Conference on Accelerator and Large Experimental Physics Control Systems, Trieste, Italy, 4–8 October 1999. [Google Scholar]
- Resul, D.; Gündüz, M.Z. Analysis of cyber-attacks in IoT-based critical infrastructures. Int. J. Inf. Secur. Sci. 2020, 8, 122–133. [Google Scholar]
- Green, B.; Krotofil, M.; Abbasi, A. On the significance of process comprehension for conducting targeted ICS attacks. In Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, 3 November 2017; pp. 57–67. [Google Scholar]
- Demertzis, K.; Iliadis, L. A computational intelligence system identifying cyber-attacks on smart energy grids. In Modern Discrete Mathematics and Analysis; Springer: Berlin/Heidelberg, Germany, 2018; pp. 97–116. [Google Scholar]
- Rodofile, N.R.; Radke, K.; Foo, E. Extending the cyber-attack landscape for SCADA-based critical infrastructure. Int. J. Crit. Infrastruct. Prot. 2019, 25, 14–35. [Google Scholar] [CrossRef]
- Cherdantseva, Y.; Burnap, P.; Blyth, A.; Eden, P.; Jones, K.; Soulsby, H.; Stoddart, K. A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 2016, 56, 1–27. [Google Scholar] [CrossRef]
- Rubio, J.E.; Alcaraz, C.; Roman, R.; Lopez, J. Current cyber-defense trends in industrial control systems. Comput. Secur. 2019, 87, 101561. [Google Scholar] [CrossRef]
- Nechibvute, A.; Mafukidze, H. Integration of scada and industrial iot: Opportunities and challenges. IETE Tech. Rev. 2023, 1–14. [Google Scholar] [CrossRef]
- Lin, H.; Slagell, A.; Kalbarczyk, Z.T.; Sauer, P.W.; Iyer, R.K. Runtime semantic security analysis to detect and mitigate control-related attacks in power grids. IEEE Trans. Smart Grid 2016, 9, 163–178. [Google Scholar] [CrossRef]
- Zhang, S.; Luo, X.; Litvinov, E. Serverless computing for cloud-based power grid emergency generation dispatch. Int. J. Electr. Power Energy Syst. 2021, 124, 106366. [Google Scholar] [CrossRef]
- Zeng, P.; Zhou, P. Intrusion detection in scada system: A survey. In Intelligent Computing and Internet of Things; Springer: Berlin/Heidelberg, Germany, 2018; pp. 342–351. [Google Scholar]
- Davis, C.; Tate, J.; Okhravi, H.; Grier, C.; Overbye, T.; Nicol, D. SCADA cyber security testbed development. In Proceedings of the 2006 38th North American Power Symposium, Carbondale, IL, USA, 17–19 September 2006; pp. 483–488. [Google Scholar]
- Bere, M.; Muyingi, H. Initial investigation of industrial control system (ICS) security using artificial immune system (AIS). In Proceedings of the 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), Windhoek, Namibia, 17–20 May 2015; pp. 79–84. [Google Scholar]
- Molle, M.; Raithel, U.; Kraemer, D.; Graß, N.; Söllner, M.; Aßmuth, A. Security of cloud services with low-performance devices in critical infrastructures. In Proceedings of the Cloud Computing 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization, Venice, Italy, 5–9 May 2019; p. 98. [Google Scholar]
- Routray, K.; Bera, P. Context-Aware Attribute Based Access Control for Cloud-based SCADA Systems. In Proceedings of the 1st Workshop on Enhanced Network Techniques and Technologies for the Industrial IoT to Cloud Continuum, New York, NY, USA, 10 September 2023; pp. 35–40. [Google Scholar]
- Alam, S.; Shuaib, M.; Samad, A. A collaborative study of intrusion detection and prevention techniques in cloud computing. In Proceedings of the International Conference on Innovative Computing and Communications, New Delhi, India, 5–6 May 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 231–240. [Google Scholar]
- Anthi, E.; Williams, L.; Rhode, M.; Burnap, P.; Wedgbury, A. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. J. Inf. Secur. Appl. 2021, 58, 102717. [Google Scholar] [CrossRef]
Vulnerability Impact | Article Reference | Authors, Year |
---|---|---|
The dependence on cloud communication renders the SCADA system more vulnerable to external access. | [15] | Sajid et al., 2016 |
Security threats increase due to the required connectivity to the public cloud. | [12] | Yi et al., 2017 |
Increasing risks that can potentially affect the security of cloud-based SCADA systems. | [4] | Stojanović et al., 2019 |
The loss of connection leads to delayed processes, data loss, and privacy issues. | [13] | Bhamare et al., 2020 |
Communication through a public cloud exposes the SCADA system to potential cyberattacks. | [25] | Nazir et al., 2020 |
The reliance on cloud communication can expose SCADA to denial-of-service (DoS) attacks and man-in-the-middle (MITM) attacks | [2] | Yadav et al., 2021 |
Vulnerability Impact | Article Reference | Authors, Year |
---|---|---|
Security risks emerge due to the multi-tenancy feature inherent in cloud technologies. | [26] | Cerullo et al., 2016 |
Sharing the infrastructure with external parties exposes the system to command/response injections, including DoS and MITM attacks. | [4] | Stojanović et al., 2019 |
Cloud vendors do not guarantee that SCADA resources will not be shared with other businesses, potentially leading to threats to the system | [25] | Nazir et al., 2020 |
Vulnerability Impact | Article Reference | Authors, Year |
---|---|---|
Malicious administrators at the cloud provider (CP) or any other user with privileged access to resources will consistently threaten the system. | [26] | Cerullo et al., 2016 |
Threats associated with external individuals and cloud service providers. | [15] | Sajid et al., 2016 |
Employees and vendors associated with the cloud might have authorized access to and/or control over sensors on the network, potentially leading to various security risks. | [27] | Ulltveit-Moe et al., 2016 |
Other remote cloud users are abusing the system’s flaws. | [13] | Bhamare et al., 2020 |
The loss of access to SCADA system resources can be caused either by employees of CPs with malicious intentions or by innocent mistakes. | [25] | Nazir et al., 2020 |
Vulnerability Impact | Article Reference | Authors, Year |
---|---|---|
SCADA systems use Modbus/TCP, IEC 61850, and DNP3 for automation and control. However, these protocols lack protection and expose control and automation operations to cyberattacks. | [15] | Sajid et al., 2016 |
SCADA-specific application layer protocols such as Modbus and DNP3 do not support encryption and authentication controls, negatively impacting the security of cloud-based SCADA systems. | [4] | Stojanović et al., 2019 |
The security risks in the traditional SCADA system propagate due to the absence of protection controls in Modbus/TCP, IEC 40, and DNP3. | [2] | Yadav et al., 2021 |
Attack Type | Authors, Year, Reference | Attack’s Cause | Attack’s Impact |
---|---|---|---|
DoS Attacks | Cerullo et al., 2016, [26] | Not mentioned | Target the availability of SCADA systems |
Sajid et al., 2016, [15] | Not mentioned | Unavailability of the service | |
Molle et al., 2019, [46] | Vulnerable Internet connection in SCADA systems | Prevents data acquisition and data analytics from being available to users | |
Rubio et al., 2019, [39] | Vulnerabilities in hypervisors | The service becomes unavailable to its registered users | |
Stojanović et al., 2019, [4] | Sharing infrastructure | Not mentioned | |
Nazir et al., 2020, [15] | Not mentioned | System collapsing | |
Yadav et al., 2021, [2] | Communication links between SCADA systems and cloud services | Altering of SCADA system information network and opening back doors | |
MITM Attacks | Sajid et al., 2016, [15] | Not mentioned | Gain unauthorized access to the system using spoofing attacks and monitor activities using sniffing attacks |
Stojanović et al., 2019, [4] | Sharing infrastructure | Not mentioned | |
Yadav et al., 2021, [2] | Communication links between SCADA systems and cloud service | Attackers can spoof or sniff information on the network of the SCADA systems | |
APTs Attacks | Sajid et al., 2016, [15] | Zero-day attacks | Stealing data of cloud-based SCADA systems |
Ulltveit-Moe et al., 2016, [27] | Zero-day vulnerabilities that are not patched on time | Anti-malware cannot detect zero-day attacks, which can initiate many software errors that will make several SCADA devices instantly vulnerable | |
Rubio et al., 2019, [39] | Network zero-day vulnerabilities | Attackers can execute remote operations using previously launched malware |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wali, A.; Alshehry, F. A Survey of Security Challenges in Cloud-Based SCADA Systems. Computers 2024, 13, 97. https://doi.org/10.3390/computers13040097
Wali A, Alshehry F. A Survey of Security Challenges in Cloud-Based SCADA Systems. Computers. 2024; 13(4):97. https://doi.org/10.3390/computers13040097
Chicago/Turabian StyleWali, Arwa, and Fatimah Alshehry. 2024. "A Survey of Security Challenges in Cloud-Based SCADA Systems" Computers 13, no. 4: 97. https://doi.org/10.3390/computers13040097
APA StyleWali, A., & Alshehry, F. (2024). A Survey of Security Challenges in Cloud-Based SCADA Systems. Computers, 13(4), 97. https://doi.org/10.3390/computers13040097