Proceedings of the 4th ACM Workshop on Cyber-Physical System Security 2018
DOI: 10.1145/3198458.3198460
|View full text |Cite
|
Sign up to set email alerts
|

Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks

Abstract: The IEC-60870-5-104 (IEC-104) protocol is commonly used in Supervisory Control and Data Acquisition (SCADA) networks to operate critical infrastructures, such as power stations. As the importance of SCADA security is growing, characterization and modeling of SCADA traffic for developing defense mechanisms based on the regularity of the polling mechanism used in SCADA systems has been studied, whereas the characterization of traffic caused by nonpolling mechanisms, such as spontaneous events, has not been well-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Therefore, the procedure to deploy an IDS on the SCADA network is not so different from the deployment on general TCP/IP networks. Nevertheless, before building and deploying an IDS on SCADA network, we have to know normal patterns of TCP data packets that contain SCADA protocol packets before understanding the data packet that contains an attack packet as proposed by Lin et al [8] in understanding IEC 104 traffic patterns and Hodo et al [9] for anomalies in the SCADA system on the IEC 104 protocol. Subsection 3.1 discusses details of security holes in the five crucial points in Figure 2 that are used as a backdoor to exploit the SCADA system, subsection 3.2 discusses how the IDS alarm sensors are set up on those five points, so the IDS can work efficiently and accurately for detecting anomalies in the system SCADA networks and subsection 3.3 proposes a model for a future study to generate reliable IDS in the SCADA system.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the procedure to deploy an IDS on the SCADA network is not so different from the deployment on general TCP/IP networks. Nevertheless, before building and deploying an IDS on SCADA network, we have to know normal patterns of TCP data packets that contain SCADA protocol packets before understanding the data packet that contains an attack packet as proposed by Lin et al [8] in understanding IEC 104 traffic patterns and Hodo et al [9] for anomalies in the SCADA system on the IEC 104 protocol. Subsection 3.1 discusses details of security holes in the five crucial points in Figure 2 that are used as a backdoor to exploit the SCADA system, subsection 3.2 discusses how the IDS alarm sensors are set up on those five points, so the IDS can work efficiently and accurately for detecting anomalies in the system SCADA networks and subsection 3.3 proposes a model for a future study to generate reliable IDS in the SCADA system.…”
Section: Security Analysismentioning
confidence: 99%
“…Research work that aims to study the traffic data in the SCADA system have been carried out by [8]. The researchers investigate the normal traffic of the international electrotechnical commission (IEC) 104 protocol in the SCADA system.…”
Section: Introductionmentioning
confidence: 99%
“…As such, we further analyzed this particular type of Per/Cyl COT from O30, and found that O30 transmitted these same 37 IOAs every 10 seconds. Periodic transmission of data as seen by this event can be essential in modeling intrusion detecting system, which have been proposed previously by several papers [1], [2], [6].…”
Section: Analysis Of I-format Packetsmentioning
confidence: 99%
“…To our best knowledge, this paper presents the first measurement study of a real-world IEC 104 network used for coordinating AGC in a live system. All previous studies of IEC 104 have been done either with emulated networks or testbeds [6], [7].…”
Section: Introductionmentioning
confidence: 99%
“…By using entropy in Equation 1, which measures the amount of disorder in the observed data, and taking into account the peculiarities of traffic pattern in SCADA systems, it is possible to detect even small deviations from the reference state, and to differentiate regular behavior from that when under attack. Furthermore, the particular characteristics of the SCADA-generated traffic, specifically its periodic shape [12], allow us to retain the observation data from one normal day for a long time, without the need for frequent updates and recalculation of the reference probability distribution Q(x).…”
Section: B Distributed Statistical Sdn-agents For Attack Detectionmentioning
confidence: 99%