2019
DOI: 10.3390/make1010022
|View full text |Cite
|
Sign up to set email alerts
|

Encrypted DNP3 Traffic Classification Using Supervised Machine Learning Algorithms

Abstract: The Distributed Network Protocol (DNP3) is predominately used by the electric utility industry and, consequently, in smart grids. The Peekaboo attack was created to compromise DNP3 traffic, in which a man-in-the-middle on a communication link can capture and drop selected encrypted DNP3 messages by using support vector machine learning algorithms. The communication networks of smart grids are a important part of their infrastructure, so it is of critical importance to keep this communication secure and reliabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Researchers in [18] find out that by using supervised machine learning algorithm support vector machine (SVM), the encrypted data packet in SCADA network running DNP3 protocol can be classified. Thus, a man-in-the-middle (MiTM) on communication link can capture as well as remove the encrypted DNP3 packet data that already selected by the SVM, this is due to the opening of the SCADA connection to the Heterogeneous networks.…”
Section: Vulnerability Issues Of Scada Systemmentioning
confidence: 99%
See 3 more Smart Citations
“…Researchers in [18] find out that by using supervised machine learning algorithm support vector machine (SVM), the encrypted data packet in SCADA network running DNP3 protocol can be classified. Thus, a man-in-the-middle (MiTM) on communication link can capture as well as remove the encrypted DNP3 packet data that already selected by the SVM, this is due to the opening of the SCADA connection to the Heterogeneous networks.…”
Section: Vulnerability Issues Of Scada Systemmentioning
confidence: 99%
“…Thus, a man-in-the-middle (MiTM) on communication link can capture as well as remove the encrypted DNP3 packet data that already selected by the SVM, this is due to the opening of the SCADA connection to the Heterogeneous networks. Figure 1 illustrates the effect of SCADA network interconnection to external heterogeneous network as described by the above previous works [18].…”
Section: Vulnerability Issues Of Scada Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…With regard to machine learning methods, de Toledo et al [19] developed a method that encrypts the traffic using the DNP3 protocol. This study used supervised algorithms to classify messages from the same protocol using datasets from the medium voltage of substations using simulation methods.…”
Section: Related Workmentioning
confidence: 99%