Enhancing Integrity of Modbus TCP Through Covert Channels

被引:0
|
作者
Taylor, James M., Jr. [1 ]
Sharif, Hamid R. [2 ]
机构
[1] Univ Nebrsaka, Natl Strateg Res Inst, Omaha, NE 68198 USA
[2] Univ Nebraska Lincoln, Elect & Comp Engn Dept, Omaha, NE 68182 USA
关键词
cyber-physical systems; industrial control systems; operational technology; information security; cyber-physical adversary; information assurance; denial of service; Modbus; man-in-the-middle attack; integrity; covert communications channel;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
CPS-enabled systems form the underlying support infrastructure that impact the efficient delivery of critical goods and services in our modern society. Failure to adequately protect the integrity, confidentiality, and availability of our critical infrastructure systems, like transportation, delivery of energy and water, and healthcare, could introduce vulnerabilities that could be exploited by attackers. CPS networks originated from a number of proprietary protocols, built to operate without connections that extended beyond the plant walls. This "security through obscurity" approach did not reveal widespread security risks until these systems were interconnected with other information technology systems, including vulnerable business operations networks. The characteristics of the communications protocols used in operational technology systems, like Modbus, present a number of barriers to adopting security enhancements. When these systems are exploited, which can be easily demonstrated on a Modbus system, the impact of security failures can be severe. Covert channels have the potential to create an out-of-band communication path that would enable some level of integrity checking between devices. The Modbus Covert Channel Integrity Check is a proposed concept that would demonstrate the use of covert channels as a method of secure communication that would prevent a number of attacks, including man-in-the-middle.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] 开放的MODBUS TCP(连载二)
    华镕
    自动化博览, 2005, (02) : 73 - 74
  • [32] Application of Modbus/TCP Protocol in Smart Home
    Xiao, Zeyu
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT 2017), 2017, 70 : 697 - 700
  • [33] Design and Implementation of Industrial Firewall for Modbus/TCP
    Shang, Wenli
    Qiao, Quansheng
    Wan, Ming
    Zeng, Peng
    JOURNAL OF COMPUTERS, 2016, 11 (05) : 432 - 438
  • [34] 开放的MODBUS TCP(连载三)
    华镕
    自动化博览, 2005, (03) : 77 - 78
  • [35] Analysis of Malicious Traffic in Modbus/TCP Communications
    Kobayashi, Tiago H.
    Batista, Aguinaldo B., Jr.
    Medeiros, Joao Paulo S.
    Filho, Jose Macedo F.
    Brito, Agostinho M., Jr.
    Motta Pires, Paulo S.
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2009, 5508 : 200 - 210
  • [36] Construction of the covert channels
    Grusho, A
    Timonina, E
    COMPUTER NETWORK SECURITY, 2003, 2776 : 428 - 431
  • [37] Covert Channels on GPGPUs
    Naghibijouybari, Hoda
    Abu-Ghazaleh, Nael
    IEEE COMPUTER ARCHITECTURE LETTERS, 2017, 16 (01) : 22 - 25
  • [38] Keyboards and covert channels
    Shah, Gaurav
    Molina, Andres
    Blaze, Matt
    USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, 2006, : 59 - +
  • [39] COVERT CHANNELS IN LANS
    GIRLING, CG
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 292 - 296
  • [40] Enhancing Multipath TCP Security Through Software Defined Networking
    Melki, Reem
    Hussein, Ali
    Chehab, Ali
    2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2019, : 33 - 38