Passive Inference of Attacks on SCADA Communication Protocols

被引:13
|
作者
Bou-Harb, Elias [1 ]
机构
[1] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
关键词
DNP3; Modbus; SCADA; CPS; Cyber attacks; Passive measurement; Cyber threat intelligence;
D O I
10.1109/ICC.2016.7510609
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security of industrial Cyber-Physical Systems (CPS) has been recently receiving significant attention from the research community. While the majority of such attention originates from the control theory domain, very few works proposed viable approaches to the problem from the practical perspective. In this work, we do not claim that we propose a particular solution to a specific problem related to CPS security, but rather present a first look into what can help shape these solutions in the future. Indeed, our vision and ultimate goal is to attempt to merge or at least diminish the gap between highly theoretical solutions and practical approaches derived from insightful empirical experimentation, for securing CPS. Towards this goal, in this work, we present what we believe is the first specimen ever of passive measurements of real attacks on CPS communication protocols. By analyzing a recent one-week dataset rendered by 20 GB of unsolicited real traffic targeting half a million routable, allocated but unused Internet Protocol (IP) addresses, we shed the light on attackers' intention and actual attacks targeting CPS. Specifically, we characterize such attacks in terms of their types, their frequency, their target protocols and possible orchestration behavior. Our results demonstrate a staggering 3 thousand scanning attempts and close to 2 thousand denial of service attacks on various CPS communication protocols. One insightful observation from our work is the fact that attackers are not interested in exploiting the Modbus protocol; in contrast to most literature works that are extensively dedicating their research efforts to devise secure models for Modbus. We hope that this paper motivates the literature to design secure and tailored CPS models that leverage tangible attacks and vulnerabilities inferred from empirical measurements, to achieve truly reliable and secure CPS.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
  • [1] Passive inference of attacks on CPS communication protocols
    Bou-Harb, Elias
    Ghani, Nasir
    Erradi, Abdelkarim
    Shaban, Khaled
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 110 - 122
  • [2] SCADA communication protocols: vulnerabilities, attacks and possible mitigations
    Durga Samanth Pidikiti
    Rajesh Kalluri
    R. K. Senthil Kumar
    B. S. Bindhumadhava
    [J]. CSI Transactions on ICT, 2013, 1 (2) : 135 - 141
  • [3] Correctness proofs for SCADA communication protocols
    Graham, James H.
    Patel, Sandip C.
    [J]. WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 392 - 397
  • [4] Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols
    Aboulsamh, Rana Mohammed
    Albugaey, Maryam Tariq
    Alghamdi, Dana Omar
    Abujaid, Fatima Hussain
    Alsubaie, Sarah Nasser
    Saqib, Nazar Abbas
    [J]. PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 209 - 214
  • [5] Protocols for Efficient Inference Communication
    Andersen, Carl
    Basu, Prithwish
    Guler, Basak
    Yener, Aylin
    Molavianjazi, Ebrahim
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2015, : 51 - 56
  • [6] Passive attacks on a class of authentication protocols for RFID
    Alomair, Basel
    Lazos, Loukas
    Poovendran, Radha
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
  • [7] POSTER: Inference Attacks against Searchable Encryption Protocols
    Islam, Mohammad Saiful
    Kuzu, Mehmet
    Kantarcioglu, Murat
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 845 - 847
  • [8] Quantum Communication Attacks on Classical Cryptographic Protocols
    Damgard, Ivan
    [J]. INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 181 - 181
  • [9] An Online Passive Testing Approach for Communication Protocols
    Lopez, Jorge
    Che, Xiaoping
    Maag, Stephane
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE 2014), 2014, : 136 - 143
  • [10] ATTACKS TO CRYPTOGRAPHY PROTOCOLS OF WIRELESS INDUSTRIAL COMMUNICATION SYSTEMS
    Ondrasina, Tomas
    Franekova, Maria
    [J]. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2010, 8 (03) : 78 - 83