Attacking and Defending DNP3 ICS/SCADA Systems

被引:15
作者
Kelli, Vasiliki [1 ]
Radoglou-Grammatikis, Panagiotis [1 ]
Sesis, Achilleas [2 ]
Lagkas, Thomas [3 ]
Fountoukidis, Eleftherios [4 ]
Kafetzakis, Emmanouil [5 ]
Giannoulakis, Ioannis [5 ]
Sarigiannidis, Panagiotis [1 ]
机构
[1] Univ Western Macedonia, Dept Elect & Comp Engn, Kozani 50100, Greece
[2] 0Infin Ltd, Imperial Off, London E6 2JG, England
[3] Int Hellen Univ, Dept Comp Sci, Kavala Campus, Kavala 65404, Greece
[4] Sidroco Holdings Ltd, Petraki Giallourou 22,Off 11, CY-1077 Nicosia, Cyprus
[5] Eight Bells Ltd, Agias Paraskevis 23, CY-2002 Nicosia, Cyprus
来源
18TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2022) | 2022年
基金
欧盟地平线“2020”;
关键词
cyberattack; DNP3; ICS; Intrusion Detection; SCADA; SECURITY;
D O I
10.1109/DCOSS54816.2022.00041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The highly beneficial contribution of intelligent systems in the industrial domain is undeniable. Automation, supervision, remote control, and fault reduction are some of the various advantages new technologies offer. A protocol demonstrating high utility in industrial settings, and specifically, in smart grids, is Distributed Network Protocol 3 (DNP3), a multi-tier, application layer protocol. Notably, multiple industrial protocols are not as securely designed as expected, considering the highly critical operations occurring in their application domain. In this paper, we explore the internal vulnerabilities-by-design of DNP3, and proceed with the implementation of the attacks discovered, demonstrated through 8 DNP3 attack scenarios. Finally, we design and demonstrate a Deep Neural Network (DNN)-based, multi-model Intrusion Detection Systems (IDS), trained with our experimental network flow cyberattack dataset, and compare our solution with multiple machine learning algorithms used for classification. Our solution demonstrates a high efficiency in the classification of DNP3 cyberattacks, showing an accuracy of 99.0%.
引用
收藏
页码:183 / 190
页数:8
相关论文
共 39 条
[1]  
Akhtar Tafseer, 2021, International Journal of Innovative Computing and Applications, P195, DOI 10.1504/IJICA.2021.116656
[2]   Securing DNP3 Broadcast Communications in SCADA Systems [J].
Amoah, Raphael ;
Camtepe, Seyit ;
Foo, Ernest .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (04) :1474-1485
[3]  
[Anonymous], 2018, CICFlowmeter-V4.0 (Formerly Known as ISCXFlowMeter) Is a Network Traffic Bi-Flow Generator and Analyser for Anomaly Detection
[4]  
Anton Simon Duque, 2017, 2017 IEEE Conference on Application, Information and Network Security (AINS), P98, DOI 10.1109/AINS.2017.8270432
[5]  
Bagaria S., 2011, 2011 International Conference on Recent Trends in Information Systems (ReTIS), P293, DOI 10.1109/ReTIS.2011.6146884
[6]   High level control of chemical plant by industry 4.0 solutions [J].
Bellini, Pierfrancesco ;
Cenni, Daniele ;
Mitolo, Nicola ;
Nesi, Paolo ;
Pantaleo, Gianni ;
Soderi, Mirco .
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2022, 26
[7]  
Biondi P., 2003, SCAPY
[8]  
Brownlee N., 1999, RFC2722: Traffic Flow Measurement: Architecture USA: RFC
[9]   Lessons from Stuxnet [J].
Chen, Thomas M. ;
Abu-Nimeh, Saeed .
COMPUTER, 2011, 44 (04) :91-93
[10]   Electricity Grid Cyber-Physical Security Risk Assessment Using Simulation of Attack Stages and Physical Impact [J].
Chen, Yu-Cheng ;
Mooney, Vincent ;
Grijalva, Santiago .
2020 IEEE KANSAS POWER AND ENERGY CONFERENCE (KPEC), 2020,