Using a packet manipulation tool for security analysis of industrial network protocols

被引:0
|
作者
Kobayashi, Tiago H. [1 ]
Batista, Aguinaldo B., Jr. [1 ]
Brito, Agostinho M., Jr. [1 ]
Pires, Paulo S. Motta [1 ]
机构
[1] Univ Fed Rio Grande do Norte, Dept Comp Engn & Automat, Secur Informat Lab, LabSIN, BR-59078970 Natal, RN, Brazil
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scapy is a free and open source packet manipulation environment written in Python language. In this paper we present a Modbus extension to Scapy, and show how this environment can be used to build tools for security analysis of industrial network protocols. Our implementation can be extended to other industrial network protocols and can help security analysts to understand how these protocols work under attacks or adverse conditions.
引用
收藏
页码:744 / 747
页数:4
相关论文
共 50 条
  • [1] An Improved and Efficient Tool for Analyzing Industrial Security Protocols
    Liu, Nan
    Zhu, Yuefei
    Mao, Zhongquan
    Xu, Wei
    [J]. 2009 IITA INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS ENGINEERING, PROCEEDINGS, 2009, : 528 - 532
  • [2] Analysis on packet resequencing for reliable network protocols
    Xia, Y
    Tse, D
    [J]. IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 990 - 1000
  • [3] Analysis on packet resequencing for reliable network protocols
    Xia, Y
    Tse, D
    [J]. PERFORMANCE EVALUATION, 2005, 61 (04) : 299 - 328
  • [4] Security and Forensic Analysis for Industrial Ethernet Protocols
    Yu, Geon
    Shon, Taeshik
    [J]. 2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, : 63 - 65
  • [6] A Calculus for the Analysis of Wireless Network Security Protocols
    Ballardin, Francesco
    Merro, Massimo
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 206 - 222
  • [7] A tool of analysis and implementation of Security Protocols on Distributed Systems
    Mengual, L
    de la Puente, C
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: SYSTEMICS, CYBERNETICS AND INFORMATICS: TECHNOLOGIES AND APPLICATIONS, 2003, : 438 - 443
  • [8] The Scyther tool: Verification, falsification, and analysis of security protocols
    Cremers, Cas J. F.
    [J]. COMPUTER AIDED VERIFICATION, 2008, 5123 : 414 - 418
  • [9] Archipelago:: A network security analysis tool
    Stang, T
    Pourbayat, F
    Burgess, M
    Canright, G
    Engo, K
    Weltzien, Å
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE SEVENTEENTH LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, 2003, : 149 - 158
  • [10] Comparative analysis of the security of configuration protocols for industrial control devices
    Martin-Liras, Luis
    Prada, Miguel A.
    Fuertes, Juan J.
    Moran, Antonio
    Alonso, Serafin
    Dominguez, Manuel
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 19 : 4 - 15