Skip to main content

Modbus Protocol Based on the Characteristics of the Transmission of Industrial Data Packet Forgery Tampering and Industrial Security Products Testing

  • Conference paper
  • First Online:
Advances in Intelligent Information Hiding and Multimedia Signal Processing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 156))

  • 658 Accesses

Abstract

Since the power plant has few network security protections and more industrial network safety problems reveal, we present a solution to verify the weakness and reinforce the safety protection. First, external operator scans the industrial network of the power plant to find alive master computer based on communication protocol. By matching the protocol, we get to find the IP address and type of the device, then use the corresponding master simulator or protocol writing tool to establish connection with the device and change the value of specific register. Obviously, the industrial network has authentication risk without verifying the IP address of the connection initiator. Here, we try to deploy general industrial firewall to fiter unknown IP address and the problem above gets fixed. Then, with arp spoofing, we succeed to hijack and modify the packet between the master computer and the device, firewall deployed before gets bypassed and industrial device can be controlled. Now we can see the industrial network lacks adequate internal auditing and monitoring and the general firewall has its limitation and weakness, therefore, we suggest we develop one customized and suitable security defense product for power industry.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Meng, X.F., Ci, X.: Big data management: concepts, techniques and challenges. J. Comput. Res. Dev. 50(1), 146–169 (2013)

    Google Scholar 

  2. Guo, Q.L., Xin, S.J., Wang, J.H.: Comprehensive security assessment for a cyber physical energy system: a lesson from Ukraine’s Blackout. Autom. Electr. Power Syst. 40(5), 145–147 (2016)

    Google Scholar 

  3. Zhu, X.Y., Fang, Q.: Study on mechanism and strategy of cybersecurity in U.S. electric power industry. Electr. Power 48(5), 81–88 (2015)

    Google Scholar 

  4. Sun, H.F., Gong, L.D., Zhang, H.T.: Research on big data analysis platform for smart grid and its application evolution. Mod. Electr. Power 33(6), 64–73 (2016)

    Google Scholar 

  5. Peng, X.S., Deng, D.Y., Cheng, S.J.: Key technologies of electric power big data and its application prospects in smart grid. Proc. CSEE 35(3), 503–511 (2015)

    Google Scholar 

  6. Zhang, B., Zhuang, C.J., Hu, J.: Ensemble clustering algorithm combined with dimension reduction techniques for power load profiles. Proc. CSEE 35(15), 3741–3749 (2015)

    Google Scholar 

  7. Qi, J., Qu, Z.Y., Lou, J.L.: A kind of attribute entity recognition algorithm based on Hadoop for power big data. Power Syst. Prot. Control. 44(24), 52–57 (2016)

    Google Scholar 

  8. Fang, X., Misra, S., Xue, G.: Smart grid—the new and improved power grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012)

    Article  Google Scholar 

  9. Wang, W., Lu, Z.: Cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344–1371 (2013)

    Article  Google Scholar 

  10. Tan, S., De, D., Song, W.Z.: Survey of security advances in smart grid: a data driven approach. IEEE Commun. Surv. Tutor. (2016)

    Google Scholar 

  11. Shvachko, K., Kuang, H., Radia, S.: The hadoop distributed file system. In: IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp. 1–10. IEEE (2010)

    Google Scholar 

  12. Zaharia, M., Chowdhury, M., Das, T.: Resilient distributed datasets: a fault-tolerant abstraction for in-memory cluster computing. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, p. 2. USENIX Association (2012)

    Google Scholar 

  13. Team, D.J.D.: Deeplearning4j: Open-source distributed deep learning for the JVM. Apache Softw. Found. Licens. 2

    Google Scholar 

  14. Fiore, U., Palmieri, F., Castiglione, A.: Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122(5), 13–23 (2013)

    Article  Google Scholar 

  15. Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Advances in Neural Information Processing Systems, pp. 3104–3112 (2014)

    Google Scholar 

Download references

Acknowledgements

This work was supported by “Research on Lightweight Active Immune Technology for Electric Power Supervisory Control System”, a science and technology project of State Grid Co., Ltd in 2019.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenting Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, Q., Wang, W., Guan, T., Liu, Y., Lin, L. (2020). Modbus Protocol Based on the Characteristics of the Transmission of Industrial Data Packet Forgery Tampering and Industrial Security Products Testing. In: Pan, JS., Li, J., Tsai, PW., Jain, L. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, vol 156. Springer, Singapore. https://doi.org/10.1007/978-981-13-9714-1_37

Download citation

Publish with us

Policies and ethics