Formal Security Assessment of Modbus Protocol

被引:0
|
作者
Nardone, Roberto [1 ]
Rodriguez, Ricardo J. [2 ,3 ]
Marrone, Stefano [3 ]
机构
[1] Univ Napoli Federico II, DIETI, Naples, Italy
[2] Univ Zaragoza, DIIS, Zaragoza, Spain
[3] Seconda Univ Napoli, Dipartimento Matemat & Fis, Caserta, Italy
关键词
SCADA control systems; Dynamic State Machines; Model checking; Cyber-Physical Security; Modbus;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Critical infrastructures as water treatment, power distribution, or telecommunications, provide daily services essential to our lifestyle. Any service discontinuity can have a high impact into our society and even into our safety. Thus, security of these systems against intentional threats must be guaranteed. However, many of these systems are based on protocols initially designed to operate on closed, unroutable networks, making them an easy target for cybercriminals. In this regard, Modbus is a widely adopted protocol in control systems. Modbus protocol, however, lacks for security properties and is vulnerable to plenty of attacks (as spoofing, flooding, or replay, to name a few). In this paper, we propose a formal modeling of Modbus protocol using an extension of hierarchical state-machines that is automatically transformed to a Promela model. This model allows us to find counterexamples of security properties by model-checking. In particular, the original contribution of this paper is the formal demonstration of the existence of man-in-the-middle attacks in Modbus-based systems. Our approach also allows to formally evaluate security properties in future extensions of Modbus protocols.
引用
收藏
页码:142 / 147
页数:6
相关论文
共 50 条
  • [21] Generating network security protocol implementations from formal specifications
    Tobler, Benjamin
    Hutchison, Andrew C. M.
    IFIP Advances in Information and Communication Technology, 2005, 177 : 34 - 53
  • [22] Formal modelling and security analysis of bitcoin's payment protocol
    Modesti, Paolo
    Shahandashti, Siamak F.
    McCorry, Patrick
    Hao, Feng
    COMPUTERS & SECURITY, 2021, 107
  • [23] A New Model of Formal Design System of Security Authentication Protocol
    Wang Hui-bin
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 549 - 552
  • [24] Safe abstractions of data encodings in formal security protocol models
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 125 - 167
  • [25] Generating network security protocol implementations from formal specifications
    Tobler, B
    Hutchison, ACM
    Certification and Security in Inter-Organizational E-Services, 2005, 177 : 33 - 53
  • [26] Security Protocol For Distributed Networks using Formal Method Specification
    Nandewal, Arun
    Mahendra, Deepesh
    Chandrasekaran, K.
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [27] Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
    Feng T.
    Wang S.
    Gong X.
    Fang J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (11): : 2312 - 2327
  • [28] Formal Theory for Security Protocol Analysis of Distributed Denial of Service
    Jiang, Rui
    Bhargava, Bharat
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2014, 5 (03): : 233 - 248
  • [29] A Study of Process Calculus for Formal Verification and Analysis of Security Protocol
    Irfan, Annie
    Gaur, Manish
    Tripathi, Surya Prakash
    PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT - 2018), 2018, : 119 - 124
  • [30] Towards formal analysis of wireless LAN security with MIS protocol
    You, Ilsun
    Hori, Yoshiaki
    Sakurai, Kouichi
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2011, 7 (02) : 112 - 120