An effective scheme against insider attack
The supervisory control and data acquisition (SCADA) system is used in both government and private sector worldwide for monitoring and controlling purposes. Considering the advancement of technology in today’s world, however, the concern on the possible attacks to such system has raised. While organ...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/71269 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-71269 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-712692023-07-07T17:22:00Z An effective scheme against insider attack Chua, Ru Hui Goh Wang Ling School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering The supervisory control and data acquisition (SCADA) system is used in both government and private sector worldwide for monitoring and controlling purposes. Considering the advancement of technology in today’s world, however, the concern on the possible attacks to such system has raised. While organisations has traditionally placed more focus on the protection against outsider attack, the detrimental effect caused by the insider attacks has often been overlooked. With the knowledge from the “insider” perspective, it would be easier for an insider to conduct an internal attack and leads to more devastating consequences. Thus, this report aims to provide an effective scheme for Transportation Company, which adopted SCADA system, to protect against insider attack by using a network configuration management (NCM) to manage real time data. In this project, RANCID is chosen to be the NCM used to manage devices because it is simpler to install and configure. In order to install RANCID, a Linux environment has to be provided and hence Ubuntu is being installed. Ubuntu is installed in a Linux virtual machine, VMware Workstation 12 player. For network topology simulation wise, Graphic Network Simulation 3 (GNS3) will be used to provide a platform to simulate real life network connection for testing and troubleshooting. The implemented idea provides configuration report of the devices in SCADA system that could be access by the operators. Devices information will be uploaded to web browser by using subversion (SVN) and web subversion (webSVN) in Ubuntu for the operators to keep track on. It can be used to ensure safety of each of the device by checking data uploaded from them. If any of the data provided from devices is not as expected, the operator will know that an unauthorized modification has been made and hence proceed to any necessary action to prevent any damages caused to the system. Bachelor of Engineering 2017-05-15T09:00:02Z 2017-05-15T09:00:02Z 2017 Final Year Project (FYP) http://hdl.handle.net/10356/71269 en Nanyang Technological University 56 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering Chua, Ru Hui An effective scheme against insider attack |
description |
The supervisory control and data acquisition (SCADA) system is used in both government and private sector worldwide for monitoring and controlling purposes. Considering the advancement of technology in today’s world, however, the concern on the possible attacks to such system has raised. While organisations has traditionally placed more focus on the protection against outsider attack, the detrimental effect caused by the insider attacks has often been overlooked. With the knowledge from the “insider” perspective, it would be easier for an insider to conduct an internal attack and leads to more devastating consequences. Thus, this report aims to provide an effective scheme for Transportation Company, which adopted SCADA system, to protect against insider attack by using a network configuration management (NCM) to manage real time data. In this project, RANCID is chosen to be the NCM used to manage devices because it is simpler to install and configure. In order to install RANCID, a Linux environment has to be provided and hence Ubuntu is being installed. Ubuntu is installed in a Linux virtual machine, VMware Workstation 12 player. For network topology simulation wise, Graphic Network Simulation 3 (GNS3) will be used to provide a platform to simulate real life network connection for testing and troubleshooting. The implemented idea provides configuration report of the devices in SCADA system that could be access by the operators. Devices information will be uploaded to web browser by using subversion (SVN) and web subversion (webSVN) in Ubuntu for the operators to keep track on. It can be used to ensure safety of each of the device by checking data uploaded from them. If any of the data provided from devices is not as expected, the operator will know that an unauthorized modification has been made and hence proceed to any necessary action to prevent any damages caused to the system. |
author2 |
Goh Wang Ling |
author_facet |
Goh Wang Ling Chua, Ru Hui |
format |
Final Year Project |
author |
Chua, Ru Hui |
author_sort |
Chua, Ru Hui |
title |
An effective scheme against insider attack |
title_short |
An effective scheme against insider attack |
title_full |
An effective scheme against insider attack |
title_fullStr |
An effective scheme against insider attack |
title_full_unstemmed |
An effective scheme against insider attack |
title_sort |
effective scheme against insider attack |
publishDate |
2017 |
url |
http://hdl.handle.net/10356/71269 |
_version_ |
1772827160904466432 |