Visible to the public The Modbus Protocol Vulnerability Test in Industrial Control Systems

TitleThe Modbus Protocol Vulnerability Test in Industrial Control Systems
Publication TypeConference Paper
Year of Publication2020
AuthorsChang, H.-C., Lin, C.-Y., Liao, D.-J., Koo, T.-M.
Conference Name2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
Date PublishedOct. 2020
PublisherIEEE
ISBN Number978-1-7281-8448-7
Keywordscommand injection attacks, composability, critical infrastructure, industrial control, Industrial Control System (ICS), integrated circuits, Metrics, Modbus protocol, performance evaluation, Protocols, pubcrawl, resilience, Resiliency, security, Security test, virtual environments
Abstract

Industrial Control Systems (ICSs) are widely used in critical infrastructure around the world to provide services that sustain peoples' livelihoods and economic operations. However, compared with the critical infrastructure, the security of the ICS itself is still insufficient, and there will be a degree of damage, if it is attacked or invaded. In the past, an ICS was designed to operate in a traditional closed network, so the industrial equipment and transmission protocol lacked security verification. In addition, an ICS has high availability requirements, so that its equipment is rarely replaced and upgraded. Although many scholars have proposed the defense mechanism that is applicable to ICS in the past, there is still a lack of tested means to verify these defense technologies. The purpose of this study is to analyze the security of a system using the Modbus transmission protocol in an ICS, to establish a modular security test system based on four types of attacks that have been identified in the past literature, namely, a detection attack, a command injection attack, a response injection attack and a denial of service, to implement the attack results and to display the process in the virtual environment of Conpot and Rapid SCADA, and finally, to adopt the ICS security standards mentioned by previous scholars, namely, confidentiality, integrity and availability, as the performance evaluation criteria of this study.

URLhttps://ieeexplore.ieee.org/document/9329422
DOI10.1109/CyberC49757.2020.00070
Citation Keychang_modbus_2020