Attacking IEC-60870-5-104 SCADA Systems PDF
Attacking IEC-60870-5-104 SCADA Systems PDF
Abstract—The rapid evolution of the Information and Commu- vast amount of data generated by the various interconnections
nications Technology (ICT) services transforms the conventional makes it more difficult to establish appropriate access control
electrical grid into a new paradigm called Smart Grid (SG). Even rules and policies. In the context of SG, the cyber attacks
though SG brings significant improvements, such as increased
reliability and better energy management, it also introduces mainly aim at compromising the availability of systems and
multiple security challenges. One of the main reasons for this secondly their integrity and confidentiality. For instance, the
is that SG combines a wide range of heterogeneous technologies, various kinds of Denial of Service (DoS) attacks can disrupt
including Internet of Things (IoT) devices as well as Supervisory the network functionality, thus resulting in disastrous conse-
Control and Data Acquisition (SCADA) systems. The latter quences, such as power outage and blackouts. On the other
are responsible for monitoring and controlling the automatic
procedures of energy transmission and distribution. Nevertheless, side, the False Data Injection (FDI) attacks can compromise
the presence of these systems introduces multiple vulnerabilities the data of smart meters, while the Man-in-the-Middle (MiTM)
because their protocols do not implement essential security attacks compromise the data privacy.
mechanisms such as authentication and access control. In this An integral part of SG is the Supervisory Control and
paper, we focus our attention on the security issues of the IEC Data Acquisition (SCADA) systems that are responsible for
60870-5-104 (IEC-104) protocol, which is widely utilized in the
European energy sector. In particular, we provide a SCADA monitoring and controlling automatic operations taking place
threat model based on a Coloured Petri Net (CPN) and emulate in a transmission or a distribution substation. The significant
four different types of cyber attacks against IEC-104. Last, we role of these systems, their constrained computing resources,
used AlienVault’s risk assessment model to evaluate the risk level as well as their legacy nature, making them an attractive
that each of these cyber attacks introduces to our system to target of cyber attackers. A successful cyber attack against
confirm our intuition about their severity.
Index Terms—SCADA security, Threat modelling, OSSIM,
SCADA systems may lead the adversary to control and
Coloured Petri Net, IEC-60870-5-104, Smart Grid affect the energy transmission and distribution functions. A
characteristic example is the Stuxnet worm, which targeted
I. I NTRODUCTION the Iranian nuclear programme. In addition, in 2015, Russian
cyber attackers attacked a Ukrainian substation resulting in the
With the advent of the Internet of Things (IoT), the tra- power outage for more than 225,000 people [3].
ditional electrical grid is transformed into a new paradigm There are many international communication standards uti-
called Smart Grid (SG) which combines Information and lized for the operation of SCADA systems. The most well-
Communication (ICT) services with the conventional opera- known are Modbus, Distributed Network Protocol (DNP3),
tions of the energy generation, transmission and distribution. Profinet, IEC-60870-5 and IEC-61850. In this paper, we focus
According to [1], SG will probably be the largest example of on the security of the IEC-60870-5-104 [4] (i.e., IEC-104)
the IoT technology, providing multiple benefits for both end- protocol. In 1995, the International Electromechanical Com-
users and utility companies. Using SGs, the utility companies mission (IEC) was released the IEC-60870-5-101 (i.e., IEC-
have the ability to monitor and control remotely all processes 101) protocol, which defines essential telecontrol messages
concerning the normal operation of the electrical grid, thus between a logic controller and a controlling server. Six years
enhancing their overall business model. On the other side, later, IEC-104 was proposed. This combines the applica-
energy consumers can monitor their energy consumption, tion messages of IEC-101 with the Transmission Control
resulting in more economical pricing and improving energy Protocol/Internet Protocol (TCP/IP), which itself introduces
management. multiple security challenges. Thus, IEC-104’s functionality is
Although SG offers multiple benefits, it also introduces based on TCP/IP which itself presents various vulnerabilities.
significant cybersecurity challenges [2]. In particular, SG con- Moreover, the application data is exchanged without any
stitutes a large-scale network consisting of various heteroge- authentication mechanism, i.e., as plaintext.
neous technologies such as IoT and legacy systems making In this paper, we investigate the security of IEC-104, by
cybersecurity a complex problem to address. For instance, the emulating four cyber attacks based on a theoretic threat model
constrained computing resources of IoT devices like smart which adopts a Coloured Petri Net (CPN). We also assessed
meters hinder the adoption of conventional security measures the risk, that each of these cyber attacks poses to the system,
such as asymmetric encryption mechanisms. Moreover, the using the AlienVault’s risk assessment model and real-world
data values from the Common Weakness Enumeration (CWE) and 3) deriving their risk levels using the AlienVault’s risk
category system. assessment model.
The rest of this paper is organized as follows. Section II
discusses relevant works on IEC-104 security. Section III III. BACKGROUND
provides a background on SCADA systems, IEC 60870-104
security and Petri nets. Section IV describes a CPN-based A. SCADA systems
threat model for SCADA systems. In Section V, we present
the implementation of four different attack types against IEC- SCADA systems mainly consist of 1) a Master Terminal
104 and we determine their associated risk level. Finally, Unit (MTU), 2) logic controllers, 3) communication interfaces
Section VI concludes this paper by summarizing its main and 4) a Human Machine Interface (HMI). MTU is a server
contributions and discussing ideas for future work. which communicates with the logic controllers that in turn
monitor the operations of the industrial environment by detect-
II. R ELATED W ORK ing and preventing possible malfunctions and anomaly states.
Examples of logic controllers are Programmable Logic Con-
In [5] E. Hodo et al. present an anomaly-based Intrusion trollers (PLC) and Remote Terminal Units (RTU). The com-
Detection System (IDS) for a SCADA simulated environment munication interfaces refer to the industrial protocols utilized
which utilizes the IEC-104 protocol. The authors create their for the communication between MTU and logic controllers.
own dataset, which includes passive Address Resolution Pro- Finally, HMI is a Graphical User Interface (GUI) application
tocol (ARP) poisoning attacks, DoS attacks and replay attacks which is installed in MTU and used by a system operator to
that replace legitimate packets with malicious ones. Based transmit commands to logic controllers and receive data from
on this dataset and utilizing the Waikato Environment for them. In this work, we focus on SCADA systems consisting of
Knowledge Analysis (WEKA) tool, they evaluated multiple PLC controllers that in turn consist of: 1) Processor, 2) Input
machine learning algorithms, such as Naive Bayes IBk, J48, Modules, 3) Output Modules, 4) Communication Module,
Random Forest, OneR, RandomTree and DecisionTable. J48 5) Memory Module and 6) Power Supply. In particular, the
and DecisionTable scored the best accuracy. Processor unit is the core of PLC, which has been programmed
In [6], Y. Yang et al. provide signature and specification to implement various logic functions and send commands to
rules for the IEC-104 protocol, by using the Snort IDS the Output Modules based on the data received by the Input
[7]. After studying the security of the specific protocol, the Modules. The Input and Output Modules denote the field
authors deployed attack signatures and specification rules for devices in an industrial environment, such as sensors, motors
the following attacks: 1) unauthorized read commands, 2) and valves. Furthermore, it is clear that PLC needs some
unauthorized reset commands, 3) unauthorized remote control communication ports to exchange data with MTU or other
and adjustment commands, 4) spontaneous packets storm, 5) PLCs and industrial modules. The Communication Modules
unauthorized interrogation commands, 6) buffer overflows, 7) of PLC are usually compatible with Recommended Standard
unauthorized broadcast requests and 8) IEC-104 port com- (RS) 232, RS 233, RS 485, Ethernet and Wi-Fi. Finally, the
munication. The difference between the attack signatures and Power Supply unit provides power to the Processor and the
specifications is that the former compares monitored data other modules.
with known cyber attack patterns, while the latter compares
monitored data with normal behavior patterns.
B. IEC 60870-5-104 Security
In [8], Y. Yang et al. also provide a specification-based
IDS for the IEC-104 protocol. The core of their system is The functionality of IEC-104 is based on the TCP/IP which
named Detection State Machine (DSM) and its functionality exhibits a number of security issues. Although the IEC 62351
is based on Finite State Machines (FSM) methodology. More [10] standard provides solutions and guidelines that enhance
detailed, the operation of IEC-104 is determined through the the security of IEC-101 and IEC-104, the industrial nature
correlations of FSM. In contrast to the traditional FSM-based of the SCADA systems using these protocols hinders their
systems, their implementation applies a set of alarms that are immediate upgrade. Consequently, besides the weaknesses
capable of distinguishing the protocol malfunctions. To deploy of the TCP/IP, a severe security issue of IEC-104 is that
and demonstrate their methodology, the authors employ the the data at the application layer is transmitted without inte-
Internet Traffic and Content Analysis (ITACA) software [9]. grating encryption mechanisms, thus making it possible the
Concerning, the evaluation results, the authors argue that the execution of traffic analysis and MiTM attacks. In addition,
True Positive Rate (TPR) and False Positive Rate (FPR) of many commands of the protocol, such as reset command,
their IDS are calculated at 100% and 0% respectively. interrogation commands, read commands, etc. do not integrate
Undoubtedly, all works mentioned above provide useful authentication mechanisms, thereby resulting in unauthorized
information and methodologies concerning the IEC-104 se- access. This vulnerability is crucial, since a cyber attacker
curity. Our paper intends to complement these works, by possesses the ability to control PLCs and possibly, the overall
1) providing a threat model based on CPN for the SCADA operation of an automation substation, thereby generating
system, 2) implementing four cyber attacks against IEC-104 disastrous consequences.
TABLE I
T RANSITIONS OF SCADA S YSTEM BASED ON A C OLORED P ETRI N ET.
C. Petri Nets
Power Supply
MTU
2 1 3
Data
two Places, where Connection is depicted by a directed arrow. Commands
Detection System (HIDS) and Network Intrusion Detection by 12%. Accordingly, the network utilization rate increased by
System (NIDS) tools, called OSSEC and Suricata, respectively. 4.81%. This attack did not disrupt the communication between
For this process, we utilized and adjusted the rules of [6]. PLC and MTU. Nevertheless, it should be noted that in a
Finally, Suricata should be able to monitor the whole network real environment where PLC is characterized by constrained
traffic. To this end, OSSIM was configured to employ a SPAN computing resources, this attack may be more successful.
(Switch Port Analyzer) port. Furthermore, if there were more cyber attackers, the effect
of the attack would be different. Finally, it should be noted
B. Attacks Emulation
that OSSIM successfully detected this attack.
In the following, we summarise the attacks we emulated as Unauthorized Access. Normally, an unauthorized user
part of our testbed. For each attack, we describe its purpose should not be able to communicate with PLC; however, as
and a high-level view of how it is undertaken. mentioned before IEC-104 does not provide any authentication
IEC-104 Packet Flooding Attack. This attack constitutes mechanism. To emulate this attack, we modified appropriately
a kind of DoS which aims at flooding MTU with specific IEC- the IP address of the cyber attacker; hence, he/she is not
104 command packets in order to mainly generate a possible considered as a member of the network. Subsequently, we
malfunction to MTU, confuse the system operator or even utilized the OpenMUC j60870 software to transmit the follow-
disrupt the operation of MTU. To emulate this attack, we ing commands: 1) Read command (C RD NA 1), 2) Reset
configured PLC to transmit the single point information com- Process command (C RP NA 1) and 3) Counter Interrogation
mand (M SP NA 1) to MTU per second. The functionality command (C CI NA 1). OSSIM detected all of these actions.
of MTU was not affected by this attack. Nevertheless, If there MiTM IEC 60870-5-104 Isolation Attack. We carried out
were more PLCs, it is likely that MTU would present certain a MiTM attack in which the cyber attacker aims at isolating
malfunction. Moreover, it is noteworthy that OSSIM was not and dropping the IEC-104 network traffic between PLC and
able to detect the attack, since this action does not violate any MTU. To this end, we performed an ARP poisoning attack
security rules of Suricata and OSSEC. utilizing the Ettercap software. In addition, we developed and
TCP SYN DoS Attack. The TCP SYN Attack is a usual enabled an Ettercap filter which isolates and drops the IEC-
DoS attack that the cyber attacker continuously transmits 104 packets between PLC and MTU. As in the previous cases,
to PLC several SYN packets without remaining the corre- OSSIM timely recognized the attack.
sponding answers (SYN+ACK). To emulate this attack, we
utilized the pre-installed hping tool of Kali Linux. During the C. Risk Assessment For IEC 60870-5-104
specific attack, the Central Processing Unit (CPU) usage rate In the following, we are using a use case, to derive the over-
increased 23%, while the memory utilization rate increased all risk level that each attack type, implemented as part of our
TABLE III
R ISK A SSESSMENT VALUES
testbed, introduces. The definition of the final expected risk is capable of identifying possible anomalies and zero-day attacks
in line with AlienVault’s risk assessment model [12]: Risk = against IEC-104 communications. The proposed system will
(Asset V alue × Event P riority × Event Reliability)/25, be integrated into OSSIM utilizing the jailbreak interface.
where each security event is related to the detection of the Moreover, the proposed IDS will apply machine learning and
threat that inflicts this risk. Asset Value (ranging between 0-5) statistical analysis techniques on TCP/IP network flows and it
is assigned by each organization and implies how significant will keep statistics (e.g., number of packets, bytes) for each
an asset is. In our testbed, there are two assets: 1) MTU IEC-104 packet, by monitoring the IEC-104 transactions based
and 2) PLC whose value is equal to 5, since they are crucial on Common Address of ASDU (CoA), IOA and CoT.
for the normal operation of a SCADA system. Event priority
VII. ACKNOWLEDGEMENT
(ranging between 0-5) is determined by the expected impact
of this threat, while event reliability (ranging between 0-10) This project has received funding from the European
is determined by the probability of the threat occurring. Union’s Horizon 2020 research and innovation programme
We have used impact, threat occurrence values from the under grant agreement No. 787011 (SPEAR).
case study presented in [13] to initialize Event Priority and R EFERENCES
Event Reliability respectively. These values were computed by
[1] S. Tan, D. De, W. Song, J. Yang, and S. K. Das, “Survey of security
using real-world data from the Common Weakness Enumer- advances in smart grid: A data driven approach,” IEEE Communications
ation (CWE) category system for software weaknesses and Surveys Tutorials, vol. 19, no. 1, pp. 397–422, Firstquarter 2017.
vulnerabilities. Table III presents these values for each of the [2] P. I. Radoglou-Grammatikis and P. G. Sarigiannidis, “Securing the smart
grid: A comprehensive compilation of intrusion detection and prevention
identified attacks of our testbed implementation. systems,” IEEE Access, vol. 7, pp. 46 595–46 620, 2019.
[3] A. Hansen, J. Staggs, and S. Shenoi, “Security analysis of an advanced
Risk Assessment metering infrastructure,” International Journal of Critical Infrastructure
Protection, vol. 18, pp. 3 – 19, 2017.
Unauthorized Access 6.58 [4] P. Matoušek, “Description and analysis of iec 104 protocol,” Faculty
of Information Technology, Brno University o Technology, Tech. Rep.,
MiTM Attacks 4.76
2017.
Traffic Analysis Attacks 3.92 [5] E. Hodo, S. Grebeniuk, H. Ruotsalainen, and P. Tavolato, “Anomaly
DoS Attacks 6.06 detection for simulated iec-60870-5-104 trafiic,” in Proceedings of the
12th International Conference on Availability, Reliability and Security,
ser. ARES ’17. New York, NY, USA: ACM, 2017, pp. 100:1–100:7.
[Online]. Available: http://doi.acm.org/10.1145/3098954.3103166
Fig. 3. Risk assessment values for the various IEC-104 attacks. [6] Y. Yang, K. McLaughlin, T. Littler, S. Sezer, B. Pranggono, and H. F.
Wang, “Intrusion detection system for iec 60870-5-104 based scada
Fig. 3 depicts that Unauthorized Access and DoS attacks networks,” in 2013 IEEE Power Energy Society General Meeting, July
introduce the highest risk levels among the other two cyber 2013, pp. 1–5.
[7] W. Park and S. Ahn, “Performance comparison and detection analysis
threats modelled; Traffic Analysis and MiTM. This confirms in snort and suricata environment,” Wireless Personal Communications,
our intuition that the possible access poses the highest risks vol. 94, no. 2, pp. 241–252, May 2017. [Online]. Available:
to critical infrastructures such as a SCADA system. On the https://doi.org/10.1007/s11277-016-3209-9
[8] Y. Yang, K. McLaughlin, S. Sezer, Y. B. Yuan, and W. Huang, “Stateful
other hand, traffic analysis and any kind of MiTM introduce intrusion detection for iec 60870-5-104 scada security,” in 2014 IEEE
a fair amount risk as they can be the first step towards getting PES General Meeting — Conference Exposition, July 2014, pp. 1–5.
access to the system. [9] J. Hurley, A. Munoz, and S. Sezer, “Itaca: Flexible, scalable network
analysis,” in 2012 IEEE International Conference on Communications
(ICC), June 2012, pp. 1069–1073.
VI. C ONCLUSIONS [10] R. Schlegel, S. Obermeier, and J. Schneider, “A security evaluation of
iec 62351,” Journal of Information Security and Applications, vol. 34,
The security of SCADA systems is crucial for the overall pp. 197 – 204, 2017.
protection of the smart grid. The protocols used by these [11] T. M. Chen, J. C. Sanchez-Aarnoutse, and J. Buford, “Petri net modeling
systems present various security issues, since they usually of cyber-physical attacks on smart grid,” IEEE Transactions on Smart
Grid, vol. 2, no. 4, pp. 741–749, 2011.
combine the TCP/IP transform capabilities with legacy ap- [12] AlienVault, “Alienvault ossim documentation,” https://www.alienvault.
plication messages. In this paper, we focused on IEC-104 com/documentation/.
and we provided a threat model for it. We also emulated [13] A. Fielder, E. Panaousis, P. Malacaria, C. Hankin, and F. Smeraldi,
“Decision support approaches for cyber security investment,” Decision
and evaluated four critical cyber attacks against IEC-104. In Support Systems, vol. 86, pp. 13–23, 2016.
our future work, we aim to develop an IDS which will be