TAMBUS: A novel authentication method through covert channels for securing industrial networks

被引:8
作者
Bernieri, Giuseppe [1 ]
Cecconello, Stefano [1 ]
Conti, Mauro [1 ]
Lain, Gianluca [2 ]
机构
[1] Univ Padua, Dept Math, Padua, Italy
[2] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
关键词
Modbus TCP; Covert channel; Cyber-physical system (CPS) security; ATTACK;
D O I
10.1016/j.comnet.2020.107583
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, many companies still use old and insecure protocols in Industrial Control Systems (ICSs). An example of such protocols is Modbus, one of the most employed industrial protocols. Also, companies are moving to Modbus/TCP when there are TCP devices involved in the facility. While remaining insecure, this migration also disrupts the assumption of air-gapped industrial networks, opening more attack surface to previously isolated systems. Due to legacy and efficiency constraint, the replacement of Modbus/TCP with secure protocols is not possible, generating big security issues. In this paper, we present TAMBUS (Transmitter Authentication and packet integrity in Modbus/TCP). This method is the first that at the same time: is not implemented in a secure by obscurity design and keeps the Modbus/TCP protocol compatible with legacy devices. TAMBUS allows detecting attacks with high statistical confidence, by leveraging two covert channels as a mean of providing security: 1) Storage-based, that hides authentication messages into the Modbus/TCP protocol fields; 2) Timing-based, that considers the inter arrival time of packets. We demonstrate the feasibility and effectiveness of our method through a prototype implementation and testing in an industrial testbed environment. Our experiments confirm that TAMBUS introduces only a small overhead, negligible in most application, and it preserves the regular functioning of industrial systems. In particular, considering the storage-based covert channel, TAMBUS introduces an error into transmitted values of only 1.19x10(-5)%, without traffic overhead. On the other hand, TAMBUS can transmit correct security information through the timing-based covert channel with an accuracy of more than 99.99%.
引用
收藏
页数:14
相关论文
共 24 条
[1]  
[Anonymous], 2016, ANAL CYBER ATTACK UK
[2]  
Barbieri G., 2020, ARXIV200701114
[3]   The Cyber Attack on Saudi Aramco [J].
Bronk, Christopher ;
Tikk-Ringas, Eneken .
SURVIVAL, 2013, 55 (02) :81-96
[4]  
Drury Bill., 2009, CONTROL TECHNIQUES D, V2 nd
[5]  
Fei L., 2018, APPL RES COMPUT, P45
[6]  
Fovino IN, 2009, IFIP ADV INF COMM TE, V311, P83
[7]  
Hayes G, 2013, INT CONF COMM INF T, P179, DOI 10.1109/ICCITechnology.2013.6579545
[8]   Attack taxonomies for the Modbus protocols [J].
Huitsing, Peter ;
Chandia, Rodrigo ;
Papa, Mauricio ;
Shenoi, Sujeet .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 :37-44
[9]  
Joelianto E, 2008, 2008 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, P70
[10]  
Keliris A., 2018, ARXIV181203478