Passive Inference of Attacks on SCADA Communication Protocols

被引:13
|
作者
Bou-Harb, Elias [1 ]
机构
[1] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
关键词
DNP3; Modbus; SCADA; CPS; Cyber attacks; Passive measurement; Cyber threat intelligence;
D O I
10.1109/ICC.2016.7510609
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security of industrial Cyber-Physical Systems (CPS) has been recently receiving significant attention from the research community. While the majority of such attention originates from the control theory domain, very few works proposed viable approaches to the problem from the practical perspective. In this work, we do not claim that we propose a particular solution to a specific problem related to CPS security, but rather present a first look into what can help shape these solutions in the future. Indeed, our vision and ultimate goal is to attempt to merge or at least diminish the gap between highly theoretical solutions and practical approaches derived from insightful empirical experimentation, for securing CPS. Towards this goal, in this work, we present what we believe is the first specimen ever of passive measurements of real attacks on CPS communication protocols. By analyzing a recent one-week dataset rendered by 20 GB of unsolicited real traffic targeting half a million routable, allocated but unused Internet Protocol (IP) addresses, we shed the light on attackers' intention and actual attacks targeting CPS. Specifically, we characterize such attacks in terms of their types, their frequency, their target protocols and possible orchestration behavior. Our results demonstrate a staggering 3 thousand scanning attempts and close to 2 thousand denial of service attacks on various CPS communication protocols. One insightful observation from our work is the fact that attackers are not interested in exploiting the Modbus protocol; in contrast to most literature works that are extensively dedicating their research efforts to devise secure models for Modbus. We hope that this paper motivates the literature to design secure and tailored CPS models that leverage tangible attacks and vulnerabilities inferred from empirical measurements, to achieve truly reliable and secure CPS.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
  • [21] Internal Security Attacks on SCADA Systems
    Sayegh, Naoum
    Chehab, Ali
    Elhajj, Imad H.
    Kayssi, Ayman
    [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY (ICCIT), 2013, : 22 - 27
  • [22] Detecting Integrity Attacks on SCADA Systems
    Mo, Yilin
    Chabukswar, Rohan
    Sinopoli, Bruno
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2014, 22 (04) : 1396 - 1407
  • [23] Secret-sharing Based Secure Communication Protocols for Passive RFIDs
    Kapoor, Harsh
    Huang, Dijiang
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5717 - 5722
  • [24] A Formal Data-Centric Approach for Passive Testing of Communication Protocols
    Lalanne, Felipe
    Maag, Stephane
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (03) : 788 - 801
  • [25] Secure NLOS ultraviolet communication against active/passive eavesdropping attacks
    Ambrish
    Chung, Yeon Ho
    [J]. OPTICS COMMUNICATIONS, 2021, 501
  • [26] Stochastic Communication Protocols for Multi-Agent Consensus Under Jamming Attacks
    Kikuchi, Kaito
    Cetinkaya, Ahmet
    Hayakawa, Tomohisa
    Ishii, Hideaki
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [27] Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning
    Hu, Hongsheng
    Zhang, Xuyun
    Salcic, Zoran
    Sun, Lichao
    Choo, Kim-Kwang Raymond
    Dobbie, Gillian
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3012 - 3029
  • [28] Attacks are protocols too
    Hagalisletto, Anders Moen
    [J]. ARES 2007: Second International Conference on Availability, Reliability and Security, Proceedings, 2007, : 1197 - 1206
  • [29] ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach
    Al Ghazo, Alaa T.
    Kumar, Ratnesh
    [J]. 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019,
  • [30] Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
    Nweke, Livinus Obiora
    Weldehawaryat, Goitom Kahsay
    Wolthusen, Stephen D.
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS DRCN 2020, 2020,