TY - JOUR
T1 - Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
AU - Goldenberg, Niv
AU - Wool, Avishai
PY - 2013/6
Y1 - 2013/6
N2 - The Modbus/TCP protocol is commonly used in SCADA systems for communications between a human-machine interface (HMI) and programmable logic controllers (PLCs). This paper presents a model-based intrusion detection system designed specifically for Modbus/TCP networks. The approach is based on the key observation that Modbus traffic to and from a specific PLC is highly periodic; as a result, each HMI-PLC channel can be modeled using its own unique deterministic finite automaton (DFA). An algorithm is presented that can automatically construct the DFA associated with an HMI-PLC channel based on about 100 captured messages. The resulting DFA-based intrusion detection system looks deep into Modbus/TCP packets and produces a very detailed traffic model. This approach is very sensitive and is able to flag anomalies such as a message appearing out of its position in the normal sequence or a message referring to a single unexpected bit. The intrusion detection approach is tested on a production Modbus system. Despite its high sensitivity, the system has a very low false positive rate-perfect matches of the model to the traffic were observed for five of the seven PLCs tested without a single false alarm over 111. h of operation. Furthermore, the intrusion detection system successfully flagged real anomalies that were caused by technicians who were troubleshooting the HMI system. The system also helped identify a PLC that was configured incorrectly.
AB - The Modbus/TCP protocol is commonly used in SCADA systems for communications between a human-machine interface (HMI) and programmable logic controllers (PLCs). This paper presents a model-based intrusion detection system designed specifically for Modbus/TCP networks. The approach is based on the key observation that Modbus traffic to and from a specific PLC is highly periodic; as a result, each HMI-PLC channel can be modeled using its own unique deterministic finite automaton (DFA). An algorithm is presented that can automatically construct the DFA associated with an HMI-PLC channel based on about 100 captured messages. The resulting DFA-based intrusion detection system looks deep into Modbus/TCP packets and produces a very detailed traffic model. This approach is very sensitive and is able to flag anomalies such as a message appearing out of its position in the normal sequence or a message referring to a single unexpected bit. The intrusion detection approach is tested on a production Modbus system. Despite its high sensitivity, the system has a very low false positive rate-perfect matches of the model to the traffic were observed for five of the seven PLCs tested without a single false alarm over 111. h of operation. Furthermore, the intrusion detection system successfully flagged real anomalies that were caused by technicians who were troubleshooting the HMI system. The system also helped identify a PLC that was configured incorrectly.
KW - Modbus/TCP
KW - Network intrusion detection system
KW - SCADA systems
UR - http://www.scopus.com/inward/record.url?scp=84879779698&partnerID=8YFLogxK
U2 - 10.1016/j.ijcip.2013.05.001
DO - 10.1016/j.ijcip.2013.05.001
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:84879779698
SN - 1874-5482
VL - 6
SP - 63
EP - 75
JO - International Journal of Critical Infrastructure Protection
JF - International Journal of Critical Infrastructure Protection
IS - 2
ER -