2014
DOI: 10.15394/jdfsl.2014.1169
|View full text |Cite
|
Sign up to set email alerts
|

Accurate Modeling of the Siemens S7 SCADA Protocol for Intrusion Detection and Digital Forensics

Abstract: The Siemens S7 protocol is commonly used in SCADA systems for communications between a Human Machine Interface (HMI) and the Programmable Logic Controllers (PLCs). This paper presents a model-based Intrusion Detection Systems (IDS) designed for S7 networks. The approach is based on the key observation that S7 traffic to and from a specific PLC is highly periodic; as a result, each HMI-PLC channel can be modeled using its own unique Deterministic Finite Automaton (DFA). The resulting DFA-based IDS is very sensi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

7
28
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 47 publications
(39 citation statements)
references
References 16 publications
7
28
0
Order By: Relevance
“…In one of the first papers on the topic, Goldenberg & Wool [16] developed a model-based approach (the GW model) using a Deterministic Finite Automata (DFA) to represent the cyclic nature of the commands exchanged in Modbus traffic. Subsequently Kleinmann et al [18] demonstrated that this methodology is also successful in other network industrial protocols like Siemens S7.…”
Section: A Backgroundmentioning
confidence: 99%
“…In one of the first papers on the topic, Goldenberg & Wool [16] developed a model-based approach (the GW model) using a Deterministic Finite Automata (DFA) to represent the cyclic nature of the commands exchanged in Modbus traffic. Subsequently Kleinmann et al [18] demonstrated that this methodology is also successful in other network industrial protocols like Siemens S7.…”
Section: A Backgroundmentioning
confidence: 99%
“…[14] developed a model-based approach (the GW model) for Network Intrusion Detection based on the normal traffic pattern in Modbus SCADA Networks using a DFA to represent the cyclic traffic. Subsequently, [18] demonstrated that a similar methodology is successful also in SCADA systems running the Siemens S7 protocol. [6] proposed a methodology to model sequences of SCADA protocol messages as Discrete Time Markov Chains (DTMCs).…”
Section: Related Workmentioning
confidence: 96%
“…Siemens S7 is used in SCADA systems for communications between a HMI and the Programmable Logic Controllers (PLCs). In (Kleinmann and Wool, 2014), Intrusion Detection system (IDS) model is designed for S7 networks which analyzes the traffic to and from a specific PLC. A unique Deterministic Finite Automata (DFA) is used to model the HMI-PLC channel traffic whether it is highly periodic or not.…”
Section: Fig 15: Forensics Model For Scada Systemsmentioning
confidence: 99%