2020
DOI: 10.5121/ijcnc.2020.12201
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Modbus TCP in Normal Operation and Under A Distributed Denial of Service Attack

Abstract: Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in serial communications (Modbus RTU/ASCII). However, not long ago, it was adapted to TCP due to the increasing popularity of the TCP/IP stack. Since it was originally designed for controlled serial lines, Modbus does not have any security features. In this paper, we wrote several benchmarks to evaluate the performance of networking devices that run Modbus TCP. Parameters reported by our benchm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…The processing delay in the baseline scenario (A1) was set to 9 ms (∼111 requests/s), which is an intermediate value between an ESP8266 chip and a Raspberry Pi [40].…”
Section: Simulation Modelmentioning
confidence: 99%
“…The processing delay in the baseline scenario (A1) was set to 9 ms (∼111 requests/s), which is an intermediate value between an ESP8266 chip and a Raspberry Pi [40].…”
Section: Simulation Modelmentioning
confidence: 99%
“…Such traffic, with the origin in spoofed IP addresses, leads to saturation of the available bandwidth, impacting protocols like Modbus/TCP. Such DoS attacks impact the response times of Modbus requests, the performance of the protocol and the monitoring of Modbus devices [28]. Indeed, many critical infrastructures are very sensitive to delay (and delay variations), thus any impact on the performance of the protocol in terms of response time, and the number of requests that can be handled in specific time periods, may have serious consequences.…”
Section: Network Attacks Against Scada Systemsmentioning
confidence: 99%