{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:26:21Z","timestamp":1775294781386,"version":"3.50.1"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:p>The study of cyber-attacks in industrial control systems is of growing interest among the research community. Nevertheless, restricted access to real industrial control systems that can be used to test attacks has limited the study of their implementation and potential impact. In this work, we discuss practical attacks applied to a room-sized water treatment testbed. The testbed includes a complete physical process, industrial communication systems, and supervisory controls. We implement scenarios in which the attacker manipulates or replaces sensor data as reported from the field devices to the control components. As a result, the attacker can change the system state vector as perceived by the controls, which will cause incorrect control decisions and potential catastrophic failures. We discuss practical challenges in setting up Man-In-The-Middle attacks on fieldbus communications in the industrial EtherNet\/IP protocol and topologies such as Ethernet rings using the Device-Level-Ring protocol. We show how the attacker can overcome those challenges, and insert herself into the ring. Once established as a Man-in-the-Middle attacker, we launched a range of attacks to modify sensor measurements and manipulate actuators. We show the efficacy of the proposed methodology in two experimental examples, where an adversary can intelligently design attacks that remain undetected for a typical bad-data detection mechanism.<\/jats:p>","DOI":"10.3233\/978-1-61499-617-0-75","type":"book-chapter","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T04:38:17Z","timestamp":1740026297000},"source":"Crossref","is-referenced-by-count":6,"title":["Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed"],"prefix":"10.3233","author":[{"family":"Urbina David","sequence":"additional","affiliation":[]},{"family":"Giraldo Jairo","sequence":"additional","affiliation":[]},{"family":"Tippenhauer Nils Ole","sequence":"additional","affiliation":[]},{"family":"Cardenas Alvaro","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Cryptology and Information Security Series","Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016"],"original-title":[],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T04:45:05Z","timestamp":1740026705000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISBN&isbn=978-1-61499-616-3&spage=75&doi=10.3233\/978-1-61499-617-0-75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-61499-617-0-75","relation":{"is-cited-by":[{"id-type":"doi","id":"10.1109\/ISIE45552.2021.9576496","asserted-by":"object"}]},"ISSN":["1871-6431"],"issn-type":[{"value":"1871-6431","type":"print"}],"subject":[],"published":{"date-parts":[[2016]]}}}