Submitted:
23 September 2023
Posted:
25 September 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Related Works
- VM facilitates the real protocol setup into the Network architecture according to the experimental requirements. This setup has many tools that allow us immediate visualization and automation to carry on large-scale experiments.
- VMs allow automated experimental setup given dynamic parameters.
- VMs allow analysis both inside the VM as well as outside. The attacker can compromise analysis tools inside the VM but allow more specific and detailed analysis. Analysis outside the VM protects the analysis tools from the attacker. Can reference existing general-purpose black box tools.
- VMs isolate the network from dangerous attacks by simulating the network instead of sending the packets over the actual network.
- The VM has many tools available to do analysis, compared to (examples: packet analyzers, process image analyzers, memory analyzers, etc.).
- VM can be remotely operated, making the experiments far more flexible.
- Establish a communication network between the Modbus components like the real-time testbed
- Analysis of the level of vulnerability of Modbus/TCP protocol
- Estimating the security impact on the system due to this exploitation
- Discussing the defense mechanism
3. Modbus/TCP Protocol
4. Experimental Setup
Modbus Master and Slave Communication Environment Setup
5. Results and Analysis
- 1. Performing a network scan (IP address & MAC address) to discover our virtual network’s IP addresses, MAC addresses, and open ports using NMAP.
- 2. To determine the registers, coils, and function codes available in the Modbus protocol using S-MOD.
Using Metasploit to Perform a DoS Attack
6. Limitation and Future Work
7. Conclusions
References
- Avi Gopstein, Avi Gopstein, Cuong Nguyen, Danielle Sass Byrnett, Kerry Worthington, and Christopher Villarreal. Framework and Roadmap for Smart Grid Interoperability Standards regional Roundtables Summary Report. US Department of Commerce, National Institute of Standards and Technology, 2020.
- Adam Hahn, Aditya Ashok, Siddharth Sridhar, and Manimaran Govindarasu. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid, 4(2):847–855, 2013. [CrossRef]
- Harold Booth, Doug Rike, and Greg Witte. Itl bulletin for december 2013 the national vulnerability database (nvd): Overview, 05 2021.
- Ayesha Rahman, Ghulam Mustafa, Abdul Qayyum Khan, Muhammad Abid, and Muhammad Hanif Durad. Launch of denial of service attacks on the modbus/tcp protocol and development of its protection mechanisms. International Journal of Critical Infrastructure Protection, 39:100568, 2022. [CrossRef]
- Peter Huitsing, Rodrigo Chandia, Mauricio Papa, and Sujeet Shenoi. Attack taxonomies for the modbus protocols. International Journal of Critical Infrastructure Protection, 1:37–44, 2008. [CrossRef]
- Szu-Chuang Li, Yennun Huang, Bo-Chen Tai, and Chi-Ta Lin. Using data mining methods to detect simulated intrusions on a modbus network. In 2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2), pages 143–148. IEEE, 2017.
- Shampa Banik, Trapa Banik, and Shudipta Banik. Intrusion detection system in smart grid-a review. Preprints, September 2023.
- Thomas H Morris and Wei Gao. Industrial control system cyber attacks. In 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013) 1, pages 22–29, 2013.
- Thomas H Morris, Bryan A Jones, Rayford B Vaughn, and Yoginder S Dandass. Deterministic intrusion detection rules for modbus protocols. In 2013 46th Hawaii International Conference on System Sciences, pages 1773–1781. IEEE, 2013.
- Artemios G Voyiatzis, Konstantinos Katsigiannis, and Stavros Koubias. A modbus/tcp fuzzer for testing internetworked industrial systems. In 2015 IEEE 20th conference on emerging technologies & factory automation (ETFA), pages 1–6. IEEE, 2015.
- Sajal Bhatia, Nishchal Singh Kush, Chris Djamaludin, Ayodeji James Akande, and Ernest Foo. Practical modbus flooding attack and detection. In Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014)[Conferences in Research and Practice in Information Technology, Volume 149], pages 57–65. Australian Computer Society, 2014.
- Panagiotis Radoglou-Grammatikis, Ilias Siniosoglou, Thanasis Liatifis, Anastasios Kourouniadis, Konstantinos Rompolos, and Panagiotis Sarigiannidis. Implementation and detection of modbus cyberattacks. In 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1–4. IEEE, 2020.
- Panagiotis I Radoglou-Grammatikis and Panagiotis G Sarigiannidis. Securing the smart grid: A comprehensive compilation of intrusion detection and prevention systems. IEEE Access, 7:46595–46620, 2019. [CrossRef]
- Pin-Han Wang, I-En Liao, Kuo-Fong Kao, and Jyun-Yao Huang. An intrusion detection method based on log sequence clustering of honeypot for modbus tcp protocol. In 2018 IEEE International Conference on Applied System Invention (ICASI), pages 255–258. IEEE, 2018.
- May Bashendy, Sohaila Eltanbouly, Ashraf Tantawy, and Abdelkarim Erradi. Design and implementation of cyber-physical attacks on modbus/tcp protocol. In World Congress on Industrial Control Systems Security (WCICSS-2020), 2020.
- Israel Barbosa de Brito and Rafael T de Sousa Jr. Development of an open-source testbed based on the modbus protocol for cybersecurity analysis of nuclear power plants. Applied Sciences, 12(15):7942, 2022. [CrossRef]
- Shampa Banik, Trapa Banik, SM Hossain, and Sohag Kumar Saha. Implementing man-in-the-middle attack to investigate network vulnerabilities in smart grid test-bed. arXiv preprint arXiv:2306.00234, 2023. arXiv:2306.00234, 2023.
- Abebe Tesfahun and D Lalitha Bhaskari. A scada testbed for investigating cyber security vulnerabilities in critical infrastructures. Automatic Control and Computer Sciences, 50:54–62, 2016. [CrossRef]
- Hao Zhang, Yuandong Min, Sanya Liu, Hang Tong, Yaopeng Li, and Zhihan Lv. Improve the security of industrial control system: A fine-grained classification method for dos attacks on modbus/tcp. Mobile Networks and Applications, pages 1–14, 2023. [CrossRef]
- John Luswata, Pavol Zavarsky, Bobby Swar, and Davison Zvabva. Analysis of scada security using penetration testing: A case study on modbus tcp protocol. In 2018 29th Biennial symposium on communications (BSC), pages 1–5. IEEE, 2018.
- FR Ametov, EA Bekirov, and MM Asanov. Organizing the information security in modbus tcp interfaces for use in the energy complex. In IOP Conference Series: Materials Science and Engineering, volume 1089, page 012007. IOP Publishing, 2021. [CrossRef]
- Ines Ortega-Fernandez and Francesco Liberati. A review of denial of service attack and mitigation in the smart grid using reinforcement learning. Energies, 16(2):635, 2023. [CrossRef]
- Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz, and Hans Dieter Schotten. Evaluation of machine learning-based anomaly detection algorithms on an industrial modbus/tcp data set. In Proceedings of the 13th international conference on availability, reliability and security, pages 1–9, 2018.
- Claude Fachkha. Cyber threat investigation of scada modbus activities. In 2019 10th IFIP international conference on new technologies, mobility and security (NTMS), pages 1–7. IEEE, 2019.
- Niv Goldenberg and Avishai Wool. Accurate modeling of modbus/tcp for intrusion detection in scada systems. international journal of critical infrastructure protection, 6(2):63–75, 2013. [CrossRef]
- Ulysse Nicolas Boudier. Design of a prototype for inverter monitoring with sunspec modbus protocol, 2018.
- IDA Modbus. Modbus application protocol specification v1. 1a. North Grafton, Massachusetts (www. modbus. org/specs. php), page 51, 2004.
- Admin. Modbuspal - a java modbus simulator, 10-15-2019.
- Shodan search engine. https://www.shodan.io/.
- Bo Chen, Nishant Pattanaik, Ana Goulart, Karen L Butler-Purry, and Deepa Kundur. Implementing attacks for modbus/tcp protocol in a real-time cyber physical system test bed. In 2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), pages 1–6. IEEE, 2015.
- Tcp syn flooding and ip spoofing attacks. http://www.cert.org/historical/advisories/ca-1996-21.cfm?
- Hping3 packet generator and analyzer. http://linux.die.net/man/8/hping3.













Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).