Title

24. Traffic Light Manipulation: Discovering the Vulnerabilities within SCADA and Industrial Control Systems

Presenter Information

Ty MintonFollow

Faculty Mentor(s)

Bryson Payne

Campus

Dahlonega

Proposal Type

Poster

Subject Area

Computer Science

Location

Nesbitt 3110

Start Date

25-3-2022 12:00 PM

End Date

25-3-2022 1:00 PM

Description/Abstract

It has become increasingly obvious throughout their prolonged use in history that traffic lights are a development that will remain practical for years to come, yet the technology — and more importantly, the security — surrounding these everyday systems has come to a grinding halt over recent years. The scope of this research is to examine and exploit traffic signals within a controlled environment to demonstrate the lackluster security within the Modbus/TCP protocol as well as within Human-Machine Interfaces (HMIs) to represent how attackers could potentially manipulate Industrial Control Systems (ICS). This research utilizes the CybatiWorks™ Traffic Control System in conjunction with a Raspberry Pi 3 to simulate a real-world traffic system utilizing both the Modbus protocol combined with a HMI to enforce traffic signal changes, allowing for an accurate simulation of how an attacker with access to said HMI or conducting buffer-overflow attacks on the Modbus protocol can manipulate the traffic signals to their desired outcome. Overall, this should represent the dire necessity for a total revamp of both the network structures and protocols utilized within industrial control systems to ensure the safety of those depending on these systems while maintaining the intentions of those who developed these technologies.

Media Format

flash_audio

ACM Poster.pptx (4451 kB)

This document is currently not available here.

Share

COinS
 
Mar 25th, 12:00 PM Mar 25th, 1:00 PM

24. Traffic Light Manipulation: Discovering the Vulnerabilities within SCADA and Industrial Control Systems

Nesbitt 3110

It has become increasingly obvious throughout their prolonged use in history that traffic lights are a development that will remain practical for years to come, yet the technology — and more importantly, the security — surrounding these everyday systems has come to a grinding halt over recent years. The scope of this research is to examine and exploit traffic signals within a controlled environment to demonstrate the lackluster security within the Modbus/TCP protocol as well as within Human-Machine Interfaces (HMIs) to represent how attackers could potentially manipulate Industrial Control Systems (ICS). This research utilizes the CybatiWorks™ Traffic Control System in conjunction with a Raspberry Pi 3 to simulate a real-world traffic system utilizing both the Modbus protocol combined with a HMI to enforce traffic signal changes, allowing for an accurate simulation of how an attacker with access to said HMI or conducting buffer-overflow attacks on the Modbus protocol can manipulate the traffic signals to their desired outcome. Overall, this should represent the dire necessity for a total revamp of both the network structures and protocols utilized within industrial control systems to ensure the safety of those depending on these systems while maintaining the intentions of those who developed these technologies.