2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST) 2020
DOI: 10.1109/mocast49295.2020.9200287
|View full text |Cite
|
Sign up to set email alerts
|

Implementation and Detection of Modbus Cyberattacks

Abstract: Supervisory Control and Data Acquisition (SCADA) systems play a significant role in Critical Infrastructures (CIs) since they monitor and control the automation processes of the industrial equipment. However, SCADA relies on vulnerable communication protocols without any cybersecurity mechanism, thereby making it possible to endanger the overall operation of the CI. In this paper, we focus on the Modbus/TCP protocol, which is commonly utilised in many CIs and especially in the electrical grid. In particular, o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…During the pre-processing step, the data is formatted utilising a sliding window of 30 instances and is normalized in the range of [0, 1]. On the other side, regarding the validation of MENSA for anomaly classification, the Modbus/TCP cyberattacks of Table I were emulated in a safe manner, utilising Smod [47]. Regarding the DNP3 cyberattacks, the intrusion detection dataset of Rodofile et al [48] was combined with normal DNP3 network flows of the substation environment.…”
Section: B Datasets and Comparative Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…During the pre-processing step, the data is formatted utilising a sliding window of 30 instances and is normalized in the range of [0, 1]. On the other side, regarding the validation of MENSA for anomaly classification, the Modbus/TCP cyberattacks of Table I were emulated in a safe manner, utilising Smod [47]. Regarding the DNP3 cyberattacks, the intrusion detection dataset of Rodofile et al [48] was combined with normal DNP3 network flows of the substation environment.…”
Section: B Datasets and Comparative Methodsmentioning
confidence: 99%
“…Our previous work in [46] could detect only Modbus/TCP anomalies. In contrast, this paper examines and detects a plethora of Modbus/TCP cyberattacks that can be performed by Smod [47], a widely known penetration-testing tool related to Modbus.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The aforementioned cyberattacks are implemented by Smod, a widely known pen-testing tool related to Modbus [39,40]. The Modbus Network Flow-Based Anomaly Detection Model adopts the DIDEROT Autoencoder [41], identifying anomalous Modbus/TCP network flows.…”
Section: Big Data Analysis Enginementioning
confidence: 99%
“…The vulnerable nature of EPES/SG is mainly related to the legacy Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. Such systems utilise insecure communication protocols, such as Modbus [5], Distributed Network Protocol 3 (DNP3) [6] and IEC 60870-5-104 [7], that have not been designed with the essential authentication and authorisation mechanisms. While both academia and industry have already provided useful security solutions, such as the IEC 62351 standard, unfortunately, many vendors and manufacturers cannot adopt them, especially in real-time.…”
Section: Introductionmentioning
confidence: 99%