Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2459976.2459982acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol

Published: 08 January 2013 Publication History

Abstract

When SCADA systems are exposed to public networks, attackers can more easily penetrate the control systems that operate electrical power grids, water plants, and other critical infrastructures. To detect such attacks, SCADA systems require an intrusion detection technique that can understand the information carried by their usually proprietary network protocols.
To achieve that goal, we propose to attach to SCADA systems a specification-based intrusion detection framework based on Bro [7][8], a runtime network traffic analyzer. We have built a parser in Bro to support DNP3, a network protocol widely used in SCADA systems that operate electrical power grids. This built-in parser provides a clear view of all network events related to SCADA systems. Consequently, security policies to analyze SCADA-specific semantics related to the network events can be accurately defined. As a proof of concept, we specify a protocol validation policy to verify that the semantics of the data extracted from network packets conform to protocol definitions. We performed an experimental evaluation to study the processing capabilities of the proposed intrusion detection framework.

References

[1]
Berthier, R. and Sanders, W. H. 2011. Specification-based intrusion detection for advanced metering infrastructure. In Proceedings of 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (Pasadena, CA, USA, Dec. 12-14, 2011), 184--193.
[2]
Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., and Valdes, A. 2007. Using model-based intrusion detection for SCADA networks. In Proceedings of the SCADA Security Scientific Symposium 2007 (Miami Beach, FL, USA, Jan. 24--25, 2007), 127--134.
[3]
Curtis, K. 2000. A DNP3 protocol primer. Technical report. DNP User's Group.
[4]
Heine, E., Khurana, H., and Yardley, T. 2011. Exploring convergence for SCADA networks. In Proceedings of 2011 IEEE PES Innovative Smart Grid Technologies (Hilton Anaheim, CA, USA, Jan. 17--19, 2011), 1--8.
[5]
Linda, O., Vollmer, T., and Manic, M. 2009. Neural network based intrusion detection system for critical infrastructures. In Proceedings of International Joint Conference on Neural Networks, 2009 (Atlanta, GA, USA, June 14--19, 2009), 1827--1834. IJCNN 2009.
[6]
Pang, R., Paxson, V., Sommer, R., and Peterson, L. 2006. Binpac: A yacc for writing application protocol parsers. In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement (New York, NY, USA, Oct 25--27, 2006), 289--300. IMC '06.
[7]
Paxson, V. 1999. Bro: A system for detecting network intruders in real-time. Computer Networks, 31, 23 (Dec. 1999), 2435--2463.
[8]
The Bro Project. 2012. Bro Network Security Monitor. http://bro-ids.org.
[9]
The Modbus Organization. 2006. Modbus messaging on TCP/IP implementation guide v1.0b 2006. http://modbus.org.
[10]
The Wireshark Foundation. 2012. Wireshark. http://wireshark.org/.
[11]
Triangle MicroWorks, Inc. 2012. Communication Protocol Test Harness. http://trianglemicroworks.com.

Cited By

View all
  • (2024)On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic ControllersProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3645002(947-961)Online publication date: 1-Jul-2024
  • (2024)Early Attack Detection for Securing GOOSE Network TrafficIEEE Transactions on Smart Grid10.1109/TSG.2023.327274915:1(899-910)Online publication date: Jan-2024
  • (2024)Behavior-Based Intrusion Detection Approach Deployed on a Naval Testbed2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)10.1109/ETFA61755.2024.10710831(1-8)Online publication date: 10-Sep-2024
  • Show More Cited By

Index Terms

  1. Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
      January 2013
      282 pages
      ISBN:9781450316873
      DOI:10.1145/2459976

      Sponsors

      • Los Alamos National Labs: Los Alamos National Labs
      • Sandia National Labs: Sandia National Laboratories
      • DOE: Department of Energy
      • Oak Ridge National Laboratory
      • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
      • BERKELEYLAB: Lawrence National Berkeley Laboratory
      • Argonne Natl Lab: Argonne National Lab
      • Idaho National Lab.: Idaho National Laboratory
      • Pacific Northwest National Laboratory
      • Nevada National Security Site: Nevada National Security Site

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 January 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Bro
      2. DNP3
      3. SCADA
      4. specification-based intrusion detection system

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CSIIRW '13
      Sponsor:
      • Los Alamos National Labs
      • Sandia National Labs
      • DOE
      • Lawrence Livermore National Lab.
      • BERKELEYLAB
      • Argonne Natl Lab
      • Idaho National Lab.
      • Nevada National Security Site
      CSIIRW '13: Cyber Security and Information Intelligence
      January 8 - 10, 2013
      Tennessee, Oak Ridge, USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)28
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 19 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic ControllersProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3645002(947-961)Online publication date: 1-Jul-2024
      • (2024)Early Attack Detection for Securing GOOSE Network TrafficIEEE Transactions on Smart Grid10.1109/TSG.2023.327274915:1(899-910)Online publication date: Jan-2024
      • (2024)Behavior-Based Intrusion Detection Approach Deployed on a Naval Testbed2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)10.1109/ETFA61755.2024.10710831(1-8)Online publication date: 10-Sep-2024
      • (2024)RABIT, a Robot Arm Bug Intervention Tool for Self-Driving Labs2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58291.2024.00043(353-361)Online publication date: 24-Jun-2024
      • (2024)Developing a Robust Communication Infrastructure for a Distributed Smart Grid IDS2024 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR61664.2024.10679379(01-08)Online publication date: 2-Sep-2024
      • (2024)Standard specification-based intrusion detection for hierarchical industrial control systemsInformation Sciences10.1016/j.ins.2024.120102(120102)Online publication date: Jan-2024
      • (2024)Mitigating Resource Depletion and Message Sequencing Attacks in SCADA SystemsAdvanced Information Networking and Applications10.1007/978-3-031-57870-0_4(37-47)Online publication date: 10-Apr-2024
      • (2023)Cyber Threat Assessment in Monitoring Turnout Railway Systems2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)10.1109/ETFA54631.2023.10275401(1-8)Online publication date: 12-Sep-2023
      • (2023)Evaluating a Process-Aware IDS for Smart Grids on Distributed Hardware2023 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR57506.2023.10224985(418-425)Online publication date: 31-Jul-2023
      • (2023)POET: A Self-learning Framework for PROFINET Industrial Operations BehaviourTools for Design, Implementation and Verification of Emerging Information Technologies10.1007/978-3-031-33458-0_1(3-19)Online publication date: 17-Jun-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media