Autors: Sybev, E. V., Pavlova, G. V., Trifonov, R. I., Raynova, K. S., Tsochev, G. R.
Title: Analysis of practical cyberattack scenarios for wind farm SCADA systems
Keywords: cyberattack , wind farm , SCADA , wind turbine , exploit , p

Abstract: The fourth industrial revolution often referred as Industry 4.0 poses a great cybersecurity risk for Supervisory control and data acquisition (SCADA) systems. Lot of enterprises are changing the energy dependency that they have to be on wind power. These SCADA systems are often vulnerable against different kinds of cyberattacks due to the IT and OT convergence challenges that are observed. Thus, allowing attackers to successfully exploit and manipulate wind farm SCADA systems. During our research concept attack scenarios are going to be introduced. The attack scenarios are leveraging already existing real-world vulnerabilities. The attack scenarios are going to be demonstrated on a specially crafted testbed of a wind farm SCADA system.

References

    Issue

    2021 International Conference Automatics and Informatics (ICAI), 2021, Bulgaria, https://doi.org/10.1109/ICAI52893.2021.9639550

    Цитирания (Citation/s):
    1. Kelli, V., Radoglou-Grammatikis, P., Sesis, A., Lagkas, T., Fountoukidis, E., Kafetzakis, E., ... & Sarigiannidis, P. (2022, May). Attacking and Defending DNP3 ICS/SCADA Systems. In 2022 18th International Conference on Distributed Computing in Sensor Systems (DCOSS) (pp. 183-190). IEEE. - 2022 - в издания, индексирани в Scopus и/или Web of Science
    2. Rekeraho, A., Balan, T., Cotfas, D. T., Cotfas, P. A., Acheampong, R., & Musuroi, C. (2022, November). Sandbox Integrated Gateway for the Discovery of Cybersecurity Vulnerabilities. In 2022 International Symposium on Electronics and Telecommunications (ISETC) (pp. 1-4). IEEE. - 2022 - в издания, индексирани в Scopus и/или Web of Science
    3. Stoyanov, K. K., Stefanova-Stoyanova, V. V., & Danov, P. Y. (2022, May). Technological Solution for" Green Hydrogen Park" for Generation of Hydrogen, Options for its Use and Seasonal Energy Accumulation. In 2022 10th International Scientific Conference on Computer Science (COMSCI) (pp. 1-4). IEEE. - 2022 - в издания, индексирани в Scopus и/или Web of Science
    4. Trifonov, Roumen, et al. "Analysis of deep learning methods for cybersecurity in industry 4.0." AIP Conference Proceedings. Vol. 3084. No. 1. AIP Publishing, 2024. - 2024 - в издания, индексирани в Scopus и/или Web of Science
    5. Piffaretti, Diego Wallace Martins, Anderson Fernandes Pereira dos Santos, and Gabriela Moutinho de Souza Dias. "Cybersecurity analysis on precision time protocol." (2024). - 2024 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    6. Pathmanaban Y., Thiagarajan M., Palaniappan H., USB-Sentinel: A Generalized AIO Software-Assisted Insider Threat Detection Framework, 2025, Lecture Notes in Networks and Systems, issue 0, vol. 1102 LNNS, pp. 401-421, DOI 10.1007/978-981-97-8476-9_29, issn 23673370, eissn 23673389 - 2025 - в издания, индексирани в Scopus
    7. Burlacu M., Exploring and Mitigating Cyber Threats Related to Energy Offshore Critical Infrastructure in the Black Sea Region, 2025, NATO Science for Peace and Security Series C: Environmental Security, issue 0, vol. Part F140, pp. 99-130, DOI 10.1007/978-94-024-2300-6_8, issn 18746519, eissn 18746543 - 2025 - в издания, индексирани в Scopus

    Вид: публикация в международен форум, публикация в реферирано издание, индексирана в Scopus