2022 18th International Conference on Distributed Computing in Sensor Systems (DCOSS) 2022
DOI: 10.1109/dcoss54816.2022.00041
|View full text |Cite
|
Sign up to set email alerts
|

Attacking and Defending DNP3 ICS/SCADA Systems

Abstract: The highly beneficial contribution of intelligent systems in the industrial domain is undeniable. Automation, supervision, remote control, and fault reduction are some of the various advantages new technologies offer. A protocol demonstrating high utility in industrial settings, and specifically, in smart grids, is Distributed Network Protocol 3 (DNP3), a multi-tier, application layer protocol. Notably, multiple industrial protocols are not as securely designed as expected, considering the highly critical oper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…The primary purpose of the slave or outstation is to respond to requests initiated by the master [67]. In this model, the master is empowered to supervise, regulate, and collect data from slaves, thereby facilitating comprehensive control over the production processes [68]. It is divided into three layers, namely:…”
Section: Ics Communication Protocols Cyber Vulnerabilitiesmentioning
confidence: 99%
“…The primary purpose of the slave or outstation is to respond to requests initiated by the master [67]. In this model, the master is empowered to supervise, regulate, and collect data from slaves, thereby facilitating comprehensive control over the production processes [68]. It is divided into three layers, namely:…”
Section: Ics Communication Protocols Cyber Vulnerabilitiesmentioning
confidence: 99%
“…The captured packets are then processed by a feature extraction unit designed to extract network flow features from raw network packets. This unit utilizes two tools named "CICFlowMeter" and "DNP3 parser", as described in [42]. The extracted features include network flow features such as source and destination port numbers, number of packet in the network flow, data rate per second, in addition to DNP3 specific features.…”
Section: Proposed Systemmentioning
confidence: 99%
“…• DNP3 Disable Unsolicited Messages Attack The DNP3 and TCP/IP network flows generated by each node during the attack execution were produced by using a custom DNP3 Python Parser and the CICFlowMeter, respectively [42]. The resulting dataset, consisting of the above flows and related statistics, was labelled based on the previously listed DNP3 attack types.…”
Section: Dnp3 Intrusion Detection Datasetmentioning
confidence: 99%
“…The Distributed Network Protocol 3 (DNP3), as has already been mentioned, represents a multi-tier application layer protocol, which proves to be particularly useful in critical industrial settings, such as complex electrical grid systems. The authors of the paper [ 55 ] study the internal vulnerabilities which are induced by the design of the DNP3 data transmission protocol. They implement the attack patterns that are determined empirically, and the research process is experimentally documented through eight DNP3 attack scenarios.…”
Section: Relevant Existing Contributionsmentioning
confidence: 99%