2008
DOI: 10.1016/j.ijcip.2008.08.003
|View full text |Cite
|
Sign up to set email alerts
|

Attack taxonomies for the Modbus protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
105
0
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 186 publications
(107 citation statements)
references
References 0 publications
0
105
0
2
Order By: Relevance
“…Altered process measurements can lead operators to take incorrect control actions based on malicious fake data and injected commands can cause systems to take unwanted control actions (Huang, et al, 2009;Sridhar, & Manimaran, 2010). A separate comprehensive attack taxonomy with some overlap with this paper is available in (Huitsing, Chandia, Papa, & Shenoi, 2008). In summary, cyber penetration of control systems monitoring and controlling MODBUS based industrial control systems can lead to loss of the visibility and control.Industrial control systems implement feedback control loops to monitor and control the systems.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Altered process measurements can lead operators to take incorrect control actions based on malicious fake data and injected commands can cause systems to take unwanted control actions (Huang, et al, 2009;Sridhar, & Manimaran, 2010). A separate comprehensive attack taxonomy with some overlap with this paper is available in (Huitsing, Chandia, Papa, & Shenoi, 2008). In summary, cyber penetration of control systems monitoring and controlling MODBUS based industrial control systems can lead to loss of the visibility and control.Industrial control systems implement feedback control loops to monitor and control the systems.…”
Section: Background and Related Workmentioning
confidence: 99%
“…However, TCP/IP protocols also suffer from several vulnerabilities to attacks, such as denial of service (DoS), packet sniffing, spoofing, process table, TCP sequence number generation, IP half scan attacks and others [22][23][24][25][26][27][28][29][30][31][32]48,49]. Security mechanisms, including SSL/TLS, SHH and IPSec, have been employed but these solutions have a limitation in terms of the communication protocol dependencies and security dependencies of the cryptography that has been implemented [25,29,30].…”
mentioning
confidence: 99%
“…For instance, attack taxonomies have been proposed for two popular SCADA protocols, Modbus [77] and DPN3 [52]. The problem of threat analysis, that is, evaluating the impact that attacks and failures have in the controlled infrastructures, has been studied in [6,7,31,140].…”
Section: General Aspectsmentioning
confidence: 99%
“…The goal of the attacker is to send malicious commands to the PLC over a Modbus connection. For instance, consider the diagnostic register reset attack described in [77]. This attack consists of sending a message with a specific function code, causing the target to clear all counters and its diagnostic register, potentially causing the target to misbehave.…”
Section: Attack Scenario and Research Questionsmentioning
confidence: 99%
See 1 more Smart Citation