Nothing Special   »   [go: up one dir, main page]

Skip to main content

Mitigating Resource Depletion and Message Sequencing Attacks in SCADA Systems

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2024)

Abstract

Electric grid networks bring measurement data to a control center for making safety critical decisions. These messages are sent using application layer protocols like Modbus and IEC-104, which operate over TCP/IP. Such communications are susceptible to different cyber attacks. In the direction of safeguarding grids, our contributions in this paper are threefold. First, we study two types of attacks known as malformed and message sequencing attacks. In the malformed message attack, an adversary injects a large number of malformed messages and have it sent to the control center to overwhelm it and depleting its computational resources. In the sequencing attacks a series of messages are sent to generate an attack. These messages if accepted by the control center can impact safety of the grid as it can lead to improper assessment of grid network state. Second, we describe a method to detect variants of malformed messages using first order logic statements. Third, we propose a method to filter the messages belonging to malformed and sequencing attacks using the Extended Berkeley Packet Filter. This is realized by implementing logical statements and screening the messages over a window period to show that such a filtering is effective and robust against attack variants and intensity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Acarali, D., Rajarajan, M., Chema, D., Ginzburg, M.: Modelling DoS attacks & interoperability in the smart grid. In: Proceedings of the 29th International Conference on Computer Communications and Networks, ICCC 2020, pp. 1–6. IEEE (2020)

    Google Scholar 

  2. Matoušek, P., Havlena, V., Holík, L.: Efficient modelling of ICS communication for anomaly detection using probabilistic automata. In: 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 81–89 (2021)

    Google Scholar 

  3. Jørgensen, T.H., et al.: The EXpress data path: fast programmable packet processing in the operating system kernel. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, CoNEXT 2018, pp. 54–66 (2018)

    Google Scholar 

  4. SCAPY. https://scapy.net/

  5. Beasley, C., Zhong, X., Deng, J., Brooks, R., Venayagamoorthy, G.K.: A survey of electric power synchrophasor network cyber security. In: IEEE PES Innovative Smart Grid Technologies Conference Europe, pp. 1–5 (2014)

    Google Scholar 

  6. Evangeliou, I.E.: Vulnerabilities of the Modbus protocol. Ph.D. thesis, University of Piraeus, Greece (2018)

    Google Scholar 

  7. Aoufi, S., Derhab, A., Guerroumi, M.: Survey of false data injection in smart power grid: attacks, countermeasures and challenges. J. Inf. Secur. Appl. 54 (2020)

    Google Scholar 

  8. Zhu, B., Joseph, A., Sastry, S.: A taxonomy of cyber attacks on SCADA systems. In: CPSCom: Proceedings of the 4th IEEE International Conference on Cyber, Physical and Social Computing, pp. 380–388 (2011)

    Google Scholar 

  9. Tripathi, N., Hubballi, N.: Application layer denial-of-service attacks and defense mechanisms: a survey. ACM Comput. Surv. 54(4), 1–30 (2021)

    Article  Google Scholar 

  10. Phillips, B., Gamess, E., Krishnaprasad, S.: An evaluation of machine learning-based anomaly detection in a SCADA system using the Modbus protocol. In: Proceedings of the 2020 ACM Southeast Conference, ASM-SE 2020, pp. 188–196 (2020)

    Google Scholar 

  11. Anwar, M., Lundberg, L., Borg, A.: Improving anomaly detection in SCADA network communication with attribute extension. Energy Inform. 5(1), 1–22 (2022)

    Article  Google Scholar 

  12. Goldenberg, N., Wool, A.: Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int. J. Crit. Infrastruct. Prot. 6(2), 63–75 (2013)

    Article  Google Scholar 

  13. Kleinmann, A., Wool, A.: Automatic construction of statechart-based anomaly detection models for multi-threaded industrial control systems. ACM Trans. Intell. Syst. Technol. 8(4), 1–21 (2017)

    Article  Google Scholar 

  14. StationGuard. https://www.omicronenergy.com/en/solution/intrusion-detection-system-ids-for-the-power-grid/#

  15. Nyasore, O.N., Zavarsky, P., Swar, B., Naiyeju, R., Dabra, S.: Deep packet inspection in industrial automation control system to mitigate attacks exploiting Modbus/TCP vulnerabilities. In: 2020 IEEE International Conference on Intelligent Data and Security (IDS), pp. 241–245 (2020)

    Google Scholar 

  16. Lin, H., Slagell, A., Di Martino, C., Kalbarczyk, Z., Iyer, R.K.: Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, pp. 1–4 (2013)

    Google Scholar 

  17. Chan, A.C., Zhou, J.: Non-intrusive protection for legacy SCADA systems. IEEE Commun. Mag. (2023)

    Google Scholar 

  18. ZEEK IDS. https://old.zeek.org/manual/2.5.5/broids/index.html

Download references

Acknowledgement

Work reported in this paper is financially supported by funding from IHUB NTIHAC foundation IIT Kanpur through grant number IHUB-NTIHAC/2021/01/24 and also by Science and Engineering Research Board via grant CRG/2022/005198-G. Authors thankfully acknowledge the funding received.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neminath Hubballi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hubballi, N., Barsha, N.K. (2024). Mitigating Resource Depletion and Message Sequencing Attacks in SCADA Systems. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 201. Springer, Cham. https://doi.org/10.1007/978-3-031-57870-0_4

Download citation

Publish with us

Policies and ethics