Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol

Industrial control systems (ICS) are being used for surveillance and controlling numerous industrial process plants in national critical infrastructures. Supervisory control and data acquisition (SCADA) system is a core component in ICS systems for continuous monitoring and controlling these process...

Full description

Bibliographic Details
Main Authors: Rajesh L, Penke Satyanarayana
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/8887666
id doaj-2bdc9d0739c548398850a260e19a8459
record_format Article
spelling doaj-2bdc9d0739c548398850a260e19a84592021-10-11T00:39:46ZengHindawi-WileySecurity and Communication Networks1939-01222021-01-01202110.1155/2021/8887666Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus ProtocolRajesh L0Penke Satyanarayana1Department of Electronics and Communication EngineeringDepartment of Electronics and Communication EngineeringIndustrial control systems (ICS) are being used for surveillance and controlling numerous industrial process plants in national critical infrastructures. Supervisory control and data acquisition (SCADA) system is a core component in ICS systems for continuous monitoring and controlling these process plants. Legacy SCADA systems are working in isolated networks and using proprietary communication protocols which made them less exposed to cyber threats. In recent times, these ICS systems have been connected to Internet and corporate networks for data sharing and remote monitoring. They are also using open protocols and operating systems. This leads to vulnerabilities of the system to cyberattacks. Cybersecurity threats are more prevalent than ever in ICS systems. These attacks may be external or internal. Modbus is a widely deployed communication protocol for SCADA communications. There is no security in design of Modbus protocol, and it is vulnerable to numerous cyberattacks. In this paper, we worked for False Command Injection attack, False Access Injection attack, and replay attacks on Modbus protocol. Initially, a real-time SCADA testbed was set up, and we envisaged the impact of these attacks on Modbus protocol data using the testbed. In this work, we used local area network (LAN) environment only for simulating the attacks. We assumed that the attacks penetrated the LAN network. We proposed and developed (a) a method to detect replay attacks by incorporating time stamp and sequence number in Modbus communications and (b) a frame filtering module which will block unauthorized attacks like False Command Injection and False Access Injection attacks to reach programmable logic controller (PLC). Numbers of attacks were simulated and the performance of the method was measured using attack block rate (ABR). It blocked 97% of malicious Modbus transactions or attacks to reach the PLC. It protects SCADA systems from attackers, which is a core component of industrial control systems. The solution enhanced the security of SCADA systems with Modbus protocol.http://dx.doi.org/10.1155/2021/8887666
collection DOAJ
language English
format Article
sources DOAJ
author Rajesh L
Penke Satyanarayana
spellingShingle Rajesh L
Penke Satyanarayana
Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol
Security and Communication Networks
author_facet Rajesh L
Penke Satyanarayana
author_sort Rajesh L
title Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol
title_short Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol
title_full Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol
title_fullStr Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol
title_full_unstemmed Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol
title_sort detection and blocking of replay, false command, and false access injection commands in scada systems with modbus protocol
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0122
publishDate 2021-01-01
description Industrial control systems (ICS) are being used for surveillance and controlling numerous industrial process plants in national critical infrastructures. Supervisory control and data acquisition (SCADA) system is a core component in ICS systems for continuous monitoring and controlling these process plants. Legacy SCADA systems are working in isolated networks and using proprietary communication protocols which made them less exposed to cyber threats. In recent times, these ICS systems have been connected to Internet and corporate networks for data sharing and remote monitoring. They are also using open protocols and operating systems. This leads to vulnerabilities of the system to cyberattacks. Cybersecurity threats are more prevalent than ever in ICS systems. These attacks may be external or internal. Modbus is a widely deployed communication protocol for SCADA communications. There is no security in design of Modbus protocol, and it is vulnerable to numerous cyberattacks. In this paper, we worked for False Command Injection attack, False Access Injection attack, and replay attacks on Modbus protocol. Initially, a real-time SCADA testbed was set up, and we envisaged the impact of these attacks on Modbus protocol data using the testbed. In this work, we used local area network (LAN) environment only for simulating the attacks. We assumed that the attacks penetrated the LAN network. We proposed and developed (a) a method to detect replay attacks by incorporating time stamp and sequence number in Modbus communications and (b) a frame filtering module which will block unauthorized attacks like False Command Injection and False Access Injection attacks to reach programmable logic controller (PLC). Numbers of attacks were simulated and the performance of the method was measured using attack block rate (ABR). It blocked 97% of malicious Modbus transactions or attacks to reach the PLC. It protects SCADA systems from attackers, which is a core component of industrial control systems. The solution enhanced the security of SCADA systems with Modbus protocol.
url http://dx.doi.org/10.1155/2021/8887666
work_keys_str_mv AT rajeshl detectionandblockingofreplayfalsecommandandfalseaccessinjectioncommandsinscadasystemswithmodbusprotocol
AT penkesatyanarayana detectionandblockingofreplayfalsecommandandfalseaccessinjectioncommandsinscadasystemswithmodbusprotocol
_version_ 1716829096569208832