首页> 外文会议>International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery >The Modbus Protocol Vulnerability Test in Industrial Control Systems
【24h】

The Modbus Protocol Vulnerability Test in Industrial Control Systems

机译:工业控制系统中的Modbus协议漏洞测试

获取原文

摘要

Industrial Control Systems (ICSs) are widely used in critical infrastructure around the world to provide services that sustain peoples' livelihoods and economic operations. However, compared with the critical infrastructure, the security of the ICS itself is still insufficient, and there will be a degree of damage, if it is attacked or invaded. In the past, an ICS was designed to operate in a traditional closed network, so the industrial equipment and transmission protocol lacked security verification. In addition, an ICS has high availability requirements, so that its equipment is rarely replaced and upgraded. Although many scholars have proposed the defense mechanism that is applicable to ICS in the past, there is still a lack of tested means to verify these defense technologies. The purpose of this study is to analyze the security of a system using the Modbus transmission protocol in an ICS, to establish a modular security test system based on four types of attacks that have been identified in the past literature, namely, a detection attack, a command injection attack, a response injection attack and a denial of service, to implement the attack results and to display the process in the virtual environment of Conpot and Rapid SCADA, and finally, to adopt the ICS security standards mentioned by previous scholars, namely, confidentiality, integrity and availability, as the performance evaluation criteria of this study.
机译:工业控制系统(ICS中)被广泛用于重要的基础设施在世界各地提供维持人民的生计和经济运行的服务。不过,与重要基础设施相比,ICS本身的安全性仍然不足,而且会有一定程度的伤害,如果攻击或入侵。在过去,一个ICS被设计在一个传统的封闭网络中操作,所以工业设备和传输协议缺乏安全验证。此外,ICS具有高可用性的要求,使得它的设备很少更换和升级。虽然许多学者提出了防御机制,适用于在过去的ICS,仍然缺乏测试手段,以验证这些防御技术。这项研究的目的是分析使用Modbus传输协议在ICS中,建立基于四个类型的攻击已经在过去的文献中已经确定了模块化的安全测试系统的系统的安全性,即,检测攻击,命令注入攻击,响应注入攻击和拒绝服务攻击,实现攻击结果和Conpot和快速SCADA的虚拟环境中显示的过程中,最后,采用由以前的学者提到的ICS安全标准,即,机密性,完整性和可用性,本研究的绩效评价标准。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号