Passive Inference of Attacks on SCADA Communication Protocols

被引:13
|
作者
Bou-Harb, Elias [1 ]
机构
[1] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
关键词
DNP3; Modbus; SCADA; CPS; Cyber attacks; Passive measurement; Cyber threat intelligence;
D O I
10.1109/ICC.2016.7510609
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security of industrial Cyber-Physical Systems (CPS) has been recently receiving significant attention from the research community. While the majority of such attention originates from the control theory domain, very few works proposed viable approaches to the problem from the practical perspective. In this work, we do not claim that we propose a particular solution to a specific problem related to CPS security, but rather present a first look into what can help shape these solutions in the future. Indeed, our vision and ultimate goal is to attempt to merge or at least diminish the gap between highly theoretical solutions and practical approaches derived from insightful empirical experimentation, for securing CPS. Towards this goal, in this work, we present what we believe is the first specimen ever of passive measurements of real attacks on CPS communication protocols. By analyzing a recent one-week dataset rendered by 20 GB of unsolicited real traffic targeting half a million routable, allocated but unused Internet Protocol (IP) addresses, we shed the light on attackers' intention and actual attacks targeting CPS. Specifically, we characterize such attacks in terms of their types, their frequency, their target protocols and possible orchestration behavior. Our results demonstrate a staggering 3 thousand scanning attempts and close to 2 thousand denial of service attacks on various CPS communication protocols. One insightful observation from our work is the fact that attackers are not interested in exploiting the Modbus protocol; in contrast to most literature works that are extensively dedicating their research efforts to devise secure models for Modbus. We hope that this paper motivates the literature to design secure and tailored CPS models that leverage tangible attacks and vulnerabilities inferred from empirical measurements, to achieve truly reliable and secure CPS.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 50 条
  • [41] Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction
    Aarts, Fides
    Jonsson, Bengt
    Uijen, Johan
    [J]. TESTING SOFTWARE AND SYSTEMS, 2010, 6435 : 188 - +
  • [42] Generating models of infinite-state communication protocols using regular inference with abstraction
    Aarts, Fides
    Jonsson, Bengt
    Uijen, Johan
    Vaandrager, Frits
    [J]. FORMAL METHODS IN SYSTEM DESIGN, 2015, 46 (01) : 1 - 41
  • [43] Generating models of infinite-state communication protocols using regular inference with abstraction
    Fides Aarts
    Bengt Jonsson
    Johan Uijen
    Frits Vaandrager
    [J]. Formal Methods in System Design, 2015, 46 : 1 - 41
  • [44] SCADA communication and security issues
    Gao, Jingcheng
    Liu, Jing
    Rajan, Bharat
    Nori, Rahul
    Fu, Bo
    Xiao, Yang
    Liang, Wei
    Chen, C. L. Philip
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) : 175 - 194
  • [45] Uncovering attacks on security protocols
    Yang, W
    [J]. Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 572 - 575
  • [46] Validating attacks on authentication protocols
    Hagalisletto, Anders Moen
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 362 - 369
  • [47] A bound on attacks on payment protocols
    Stoller, SD
    [J]. 16TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2001, : 61 - 70
  • [48] Synthesising attacks on cryptographic protocols
    Sinclair, D
    Gray, D
    Hamilton, G
    [J]. AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 49 - 63
  • [49] Superposition Attacks on Cryptographic Protocols
    Damgard, Ivan
    Funder, Jakob
    Nielsen, Jesper Buus
    Salvail, Louis
    [J]. INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
  • [50] A bound on attacks on authentication protocols
    Stoller, SD
    [J]. FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600