|
| | | |
Practical Modbus Flooding Attack and Detection
Bhatia, S., Kush, N., Djamaludin, C., Akande, A. and Foo, E.
The Modicon Communication Bus (Modbus) protocol is one of the most commonly used protocols in industrial control systems. Modbus was not designed to provide security. This paper confirms that the
Modbus protocol is vulnerable to ooding attacks. These attacks involve injection of commands that result in disrupting the normal operation of the control system. This paper describes a set of experiments that shows that an anomaly-based change detection algorithm and signature-based Snort threshold module are capable of detecting Modbus flooding attacks. In comparing these intrusion detection techniques, we find that the signature-based detection requires a carefully selected threshold value, and that the anomaly-based change detection algorithm may have a short delay before detecting the attacks depending on the parameters used. In addition, we also generate a network traffic dataset of flooding attacks on the Modbus control system protocol. |
Cite as: Bhatia, S., Kush, N., Djamaludin, C., Akande, A. and Foo, E. (2014). Practical Modbus Flooding Attack and Detection. In Proc. Twelfth Australasian Information Security Conference (AISC 2014) Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 57-65 |
(from crpit.com)
(local if available)
|
|