Comparison of Approaches For Intrusion Detection I
Comparison of Approaches For Intrusion Detection I
*Correspondence:
[email protected] Abstract
1
Austrian Power Grid AG, IZD-Tower, Electrical networks of transmission system operators are mostly built up as isolated
Wagramer Str. 19, Vienna, Austria
Full list of author information is
networks without access to the Internet. With the increasing popularity of smart grids,
available at the end of the article securing the communication network has become more important to avoid
cyber-attacks that could result in possible power outages. For misuse detection,
signature-based approaches are already in use and special rules for a wide range of
protocols have been developed. However, one big disadvantage of signature-based
intrusion detection is that zero-day exploits cannot be detected.
Machine-learning-based anomaly detection methods have the potential to achieve
that. In this paper, various such methods for intrusion detection in substations, which
use the asynchronous communication protocol International Electrotechnical
Commission (IEC) 60870-5-104, are tested and compared. The evaluation of the
proposed methods is performed by applying them to a data set which includes normal
operation traffic and four different attacks. While the results of supervised and
semi-supervised machine learning approaches are rather encouraging, the
unsupervised and signature-based methods suffer from general bad performance and
had difficulties to detect some attacks.
Keywords: Intrusion detection, IEC 60870-5-104, SCADA
Introduction
Industrial Control System (ICS) that are used to monitor and control infrastructures,
such as electrical power grids, traditionally have mainly consisted of devices specially
developed for this specific purpose. Furthermore, they were only used in isolated net-
works without access to the Internet (Berthier et al. 2010). Since energy supply companies
focused on availability and reliability requirements, cyber security measures were often
classified as insignificant. Incidents such as Stuxnet or the BlackEnergy attacks on power
grids in the Ukraine, strongly increased awareness towards the security of these criti-
cal infrastructures (Ang and Utomo 2017). Particularly with the stronger digitalization
© The Author(s). 2020 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License,
which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were
made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless
indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your
intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly
from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
of substations and the networking of control technology components, the dangers have
become more diverse and complex. It is therefore important that not only known but
also currently unknown attack vectors against critical infrastructures can be recognized
(Butt et al. 2019). In order to meet these challenges, additional concepts for ensuring
network security and maintaining network stability will be necessary (Yan et al. 2012).
This paper studies the detection of various common attacks using packet-based meth-
ods in the context of substations using the asynchronous communication protocol
IEC 60870-5-104. Network traffic used in this paper was captured in a test environ-
ment of the Austrian Power Grid AG (APG), which is highly similar to the real-world
setup. Therefore, the test data can be considered as equivalent to real data from a
substation in which the communication is based on the IEC 60870-5-104 protocol,
see Fig. 2 in the “Experiments” section. In order to enable reproducible research the
full data set, along with the used code, will be made publicly available as stated in
“Availability of data and materials” section.
The following research questions should be answered: While the standard signature-
based approach is expected to lead to only few false-positives, are the existing rules suf-
ficient to reliably detect various common attacks in the context of substations operating
using the asynchronous communication protocol IEC 60870-5-104?
Furthermore, a semi-supervised and an unsupervised approach, which are two anomaly
detection settings with the potential to detect new attacks, are compared. Here both, the
potential to detect an attack and the price of false-positives, are unknown. A supervised
classification approach is also applied for comparison and to answer the next question:
Can the principle potential of machine learning methods be shown to detect attacks with
low false positive rates, based on the extracted features? Since a new attack cannot be
detected in a supervised setting, this should serve as an upper limit against which the two
anomaly detection settings can be compared.
Related work
Several methods to detect attacks on Supervisory Control and Data Acquisition (SCADA)
systems have already been proposed. These methods can mainly be classified into
signature-based and anomaly-based approaches (Phillips et al. 2020). It is these two
classes, which are also compared in our paper.
Signature-based approaches consist of a set of deterministic rules that either describe
the normal system or patterns which arise for already known attacks. Peterson (Peterson
2009) developed Project Quickdraw, which has later been renamed to Snort (see “Snort”
section), and tried to detect anomalies in legacy SCADA systems by using signatures.
Snort got one of the most popular signature based intrusion detection systems nowadays
and is also used for misuse detection in IEC 60970-5-104 SCADA traffic in our paper.
Yang et al. proposed a rule set for IEC 60970-5-104 traffic in Yang et al. (2013), which
could be used in conjunction with signature-based intrusion detection systems like Snort.
This was one of the most important steps in the evolution of signature-based detection
methods for securing critical infrastructures which rely on this communication protocol.
Some of these rules have been added to the rule set used to detect anomalies with Snort
in this paper. The detection of relay and Man-In-The-Middle (MITM) attacks, which was
carried out by Maynard et al. (2014), but is not part of our proposed attack data set, could
be considered in further research on IEC 60870-5-104 SCADA networks with Snort.
4 by Stuxnet, where two network bursts with instructions for the frequency converter
drives were sent out (Falliere et al. 2011). Also various Denial of Service (DoS) attacks
on SCADA systems happened before. Industroyer, a sophisticated piece of malware used
in the BlackEnergy Attack 2015 in the Ukraine, was designed to cause an impact to the
working processes of ICS used in electrical substations by blocking serial COM channels
temporarily causing a denial of control (Cherepanov 2017).
Background
The rapid technical progress of the past years in information and communication tech-
nologies had a noticeable influence on the control technology components used in
substations. Initially, the operators of the high-voltage networks coordinated necessary
switching operations by telephone to the responsible control rooms in the substations.
In the course of digitalization, data acquisition systems with automatically recorded mea-
surement data, have been installed. Decentralized control technology components, also
called Remote Terminal Units (RTU), are used to record and forward data (Vadari 2020).
The information flow is illustrated in Fig. 2 in “Experiments” section. Operators of the
SCADA System communicate with the RTUs of primary devices like transformers or cir-
cuit breakers. Communication also happens locally in the substation between the RTUs
and those primary devices themselves.
Since 1995, data transmission in European substations has mainly been based on the
asynchronous communication protocol IEC 60870-5-104 (Czechowski et al. 2015). It
shows significant security gaps due to its age and its adaptation to the needs of ICS in the
1990s, such as low bandwidth (Pliatsios et al. 2020). Mostly, control or setting commands
are sent to the primary devices. Measured values, as well as positioning data of circuit
breakers get transmitted from the primary devices to the control system. The main pur-
pose of the RTUs, which are located in so-called control cabinets in the substations, is to
transmit control signals directly to the motors of the primary devices, which can be seen
in Fig. 2 in “Experiments” section.
IEC 60870-5-104
To better understand the extraction process of the different field values for anomaly
detection also covered in “Experiments” section, a brief overview of the IEC 60870-5-104
protocol is covered here. The standard specification for the IEC 60870-5-104 protocol
combines the application layer of its predecessor IEC 60870-5-101 and a selection of the
Transmission Control Protocol (TCP)/Internet Protocol (IP) protocol suite, which can be
seen in Fig. 1.
The basic frame in IEC 60870-5-104 is called Application Protocol Data Unit (APDU)
and occurs in three different formats for data flow and link monitoring, as well as for infor-
mation transmission. Furthermore, an APDU can be split up in two parts, the Application
Protocol Control Information (APCI) and the Application Service Data Unit (ASDU).
The APCI contains basic information like APDU length or sender and receiver
sequence numbers and has a fixed packet length of 4 Bytes. Otherwise the ASDU has a
variable length to describe detailed attributes such as “Type Identification” or the “Cause
of Transmission” (IEC 2006). These field values were also extracted to detect anomalies
in the network traffic and get explained below in the tables. Table 1 shows the mapping of
transmission causes to code values.
The types of IEC 60870-5-104 packets can be structured into 255 different Type Iden-
tification numbers, but like in the case of the cause of transmission field codes, not all
of the available numbers have to be implemented (Skoko et al. 2014). Some of the most
common values for Type IDs are listed in Table 2.
Snort
Snort is an open source, signature-based, Network Intrusion Detection System (NIDS),
capable of performing real-time traffic analysis as well as packet logging on IP-based net-
works. In this paper, its performance in detecting anomalies in IEC 60870-5-104 SCADA
traffic will be compared to machine-learning-based anomaly detection. Signature-based
detection typically follows a blacklist approach. Snort basically acts as a packet sniffer and
does protocol analysis as well as content matching by using rules which watch for specific
fields in a network packet. A variety of attacks can be detected, because known signatures
periodically get transformed into rules and can be downloaded from the developers web-
site. Snorts detection engine processes the rules in order to know what fields to look for
in the raw network packets. By considering the information gathered from the rules, it is
able to detect occurring anomalous values. TCP, UDP, Internet Control Message Proto-
col (ICMP), and IP are the four protocols which are currently supported by Roesch et al.
(2020).
Snort is set up by specifying the detection rules. Snort rules contain a rule header and
the rule options part. The header includes the resulting Snort action, protocol value,
source and destination IP addresses or port numbers (Roesch et al. 2020). Information
about the inspecting part of the packet and alert messages are specified in the rule options
section. Snort has a standard basic rule set and additional rule sets which are deactivated
by default and need to be activated selectively. In 2016, Cisco Talos released an additional
rule set consisting of 33 rules, which are able to analyze IEC 60870-5-104 network traffic
(Pacho 2016).
Experiments
The data set used in this paper consists out of five network packet traces in .pcap format,
measured with Wireshark. The recording of the test data was done in a dedicated test
substation operated by APG and a schematic representation can be seen in Fig. 2. As can
be seen in the figure, the test substation contains a 110kV and a 220kV switchgear, each
of which has its own Local Area Network (LAN). The General Functions ring consisted
of several facilities important for real substations, like lock functions for primary devices.
The connection from the control center to the RTUs is also shown schematically in Fig. 2.
With the help of switches, the RTUs are connected to the APG LAN as well as the firewall,
the Network Time Protocol (NTP) server and the SCADA client. Instead of the primary
devices normally used in substations, such as the circuit breaker shown in the figure,
relays were set up to illustrate the correct control behavior. The station and field LAN
areas are based on the IEC 60870-5-104 standard. Furthermore, the LAN itself was also
integrated into the APG Wide Area Network (WAN) via IEC 60870-5-104 using a router.
The Attack Machine was a laptop capable to run Kali Linux as an operating system. All
the different attack described in the Attacks section below were performed from here.
Network traffic was recorded by a Raspberry Pi running Wireshark, which is connected
on a trunk port at the same switch as the Attack Machine.
Attacks
In addition to normal operation, four different common attacks were used to attack the
test substation. Table 3 gives a brief overview over the performed attacks.
According to the Technique Matrix proposed in the MITRE ATT&CK for ICS Frame-
work, the types of attacks performed in this paper can be classified either as Discovery or
as Impair Process Control which makes them representative for real world attack scenarios
(MITRE 2020).
Feature extraction
Currently there are no best practice guidelines for feature extraction of the IEC 60870-5-
104 protocol available. The implementation of this protocol is very application-specific,
because the users can adjust which values they want to parameterize and some of the
fields are only for special use. We extracted features that were considered as potentially
discriminating attacks from normal traffic out of the Open Systems Interconnection (OSI)
Layers 1 – 4 and the Application Layer 7. Features from Layers 1, 2 and 3 are described
below in Table 4.
With Wireshark more features could be measured from Layer 4 and they are described
in Table 5.
Features that are specific for the IEC 60870-5-104 protocol are shown in Table 6.
done for the other categorical variables IP-flag (0 or 1), asduTypeid (13 or 36) and asd-
uCause (1 or 3). The numerical variable tcp_hdr_len was treated as being either 20 or
not. Source and destination ports needed a special coding that involves both variables at
a time. First, descriptive analysis showed that port 2404 is occurring in 53.9% of cases
with other port Identification numbers being comparably rare. Additionally source and
destination port are not the same. This information was coded as two binary variables
portFeatureSrc2404 (source-port is 2404 and destination-port is not 2404) and port-
FeatureDst2404 (destination-port is 2404 and source-port is not 2404). The third case
occurring (TCP-information is missing) was already coded above.
The resulting 21 features are like follows: 4 numerical variables (frame length, IP Ttl,
TCP winSize and TCP pdu size); 5 binary missing-value variables (VLAN, IP, TCP,
TCP pdu size, x104); 10 dummy variables for VLAN (4), IP-flag (1), xTcpTdrLen (1),
asduTypeID (2) and asduCause (2); the 2 special variables for the ports.
Note that this way of coding was done based on descriptive analysis of only normal data.
Therefore, this removes a possible advantage of the supervised approach where single
variables could be turned into features additionally based on their class-separating ability.
While this was also tried, in this case it resulted in nearly the same variables with very
similar classification results. Therefore, this part is omitted. Finally, it is important to
mention that feature generation was done in a blinded way by a person not familiar with
the system or any Snort rules.
Detection of attacks
Four types of methodologies will be compared: supervised classification, semi-supervised
anomaly detection, unsupervised anomaly detection and signature-based anomaly detec-
tion using Snort. The signature-based approach is expected to have a small or zero
false positive rate, but the ability to detect the attacks is unknown. For the methods of
semi-supervised and unsupervised anomaly detection, the attacks are unknown during
learning so they have the potential to detect zero-day attacks. The question is, how close
these methods can get to the signature-based and the classification based method. Since
Table 8 NAN-statistics
Variable vlan-id IP TCP x104 rest TCP-pdu-size expert-severity
% missing 1.5% 3.7% 18.6% 71.3% 56.7% 97.8%
anomaly-based methods typically suffer from detecting too many false attacks (false pos-
itives), which limits their practical usability, the focus is especially laid on decreasing the
false positive rates.
requests should not appear in the normal traffic, the rule for detecting them was deacti-
vated and the false positives could be eliminated. The remaining three packets contained
Transport Layer Security (TLS) encrypted traffic and did not match any of the rules, so it
was classified as normal.
The packets of the Nessus attack remained largely undetected. An investigation of pos-
sible reasons revealed a high amount of TLS encrypted packets. This seems legitimate
because Nessus tested the web interfaces of the RTUs against several vulnerabilities. Since
Snort is not able to decrypt these packets, most of the traffic was not classified as an
attack. The detection rate of the fuzzy attack was also low. This can be assigned to the
anatomy of the attack itself. During the Fuzzy Scan mixed packets from normal condi-
tion to malformed are sent into the network to find vulnerabilities in the protocol. In
first tests, only 11 packets were classified as attacks. By adding additional custom rules as
stated above the accuracy could only be improved by a small amount.
Considering the short time range of only 500 packets, the detection of some attacks was
good, but the classification of the attack against the IEC 60870-5-104 protocol itself was
significantly worse than expected.
Table 10 Results of the classification approach: confusion matrix for a medium tree applied to test
data for the twoclass-case
Predicted class
Normal Attack
True Normal 238277 0
Attack 31 8220
Table 11 Results of the classification approach: confusion matrix for a medium tree applied to test
data for the multi-class case, where the goal is to distinguish the attacks, too
Predicted class
Normal Nmap Syn Flood Nessus Fuzzy
True class
Normal 238277 0 0 0 0
Nmap 4 2046 0 21 0
Syn Flood 2 0 2053 12 4
Nessus 7 7 455 1597 1
Fuzzy 40 6 1 1 1994
(Table 11). Note that in contrast to the two-class case now 53 instead of 31 attacks are
not detected, because the tree must also reach distinguishability between the attacks. Dis-
tinguishability is quite good, just Nessus and SynFlood are difficult to distinguish. This
pattern can also be seen for other classification models. Note that in a real application
one could use the two-class-classifier to find anomalies and then, in a subsequent step,
try to identify the attack using the multi-class-classifier. In practice this differentiation
could increase the resilience by decreasing the time until proper countermeasures can be
employed.
Although the groups are highly unbalanced (attacks are rare), classification results are
quite satisfying even without special treatment. That is the reason why no methods like
under- or oversampling have been applied.
Table 12 Results of the semi-supervised anomaly detection approach: confusion matrix resulting
when applying the model to test data
Predicted class
Normal Attack
True Normal 238141 136
Attack 56 9945
1 1
0.8 0.8
0.2 0.2
0 0
0 0.5 1 0 0.5 1
False positive rate False positive rate
Fig. 3 ROC-plot for semi-supervised anomaly detection (left) and unsupervised anomaly detection (right)
positive rate is plotted against the false positive rate. As a measure for the performance
the Area Under Curve (AUC) is usually given. Here, the AUC is 0.9990, which is very near
to the optimal value of 1.
Table 13 Results of the unsupervised anomaly detection approach: confusion matrix resulting when
applying the model to test data
Predicted class
Normal Attack
True Normal 233724 6211
Attack 5463 2880
While the FPR of 2.6% seems to be good, due to high proportion of normal samples,
this results in 6211 false positive samples which is too much for a practical IDS. Note this
high number of false positives already occurs when still about two third of attacks are
undetected.
Discussion of results
This study has several limits and should be considered as doing a first, static step towards
intrusion detection. First, the duration where data were gathered, is rather short so time
series analysis methods were excluded as detection methods. Additionally, due to the
short duration, not all normal situations may be included and therefore generalization
may be worse than estimated from the available data. For example, during the normal
operation captured in this study only measurements or settings of switches are requested
in single cases with the Cause of Transmission value of 3 or cyclically with a Cause of
Transmission value of 1. However, situations exist that should also be considered as nor-
mal have not been seen. One such example would be an outage of a component where
many more requests arise with the Cause of Transmission value of 20 which would be
classified as an intrusion based on the existing data. However, while it is not an intrusion
it is an anomaly whose detection would be valuable.
The present data set has a huge number of missing values which had to be accounted for
by extracting corresponding features. A first analysis of the cause for missing data showed
that during the port scan or during the Syn Flood attack, no transmission of measured
values took place, so the fields here are not filled. The RTUs in the test facility crashed
about two minutes after the start of the test because they could not withstand the number
of queries. In a follow-up study, the unknown mechanisms leading to missing values espe-
cially for normal operation should be studied in detail before data are gathered. Labeling
packets with many missing values as an intrusion would lead to an unacceptable number
of false positives, since 821 normal packets had all values missing except the frame length.
Therefore, many missing values are considered as normal. This has in turn the disadvan-
tage that faking normal operation by setting values simply to missing could be a way to
disguise an attack.
While accuracy of predictions is important, understanding the detection mechanisms
is also crucial for further improvements of detection methods and the choice of possible
countermeasures. In the raw packet data, we found that nmap sends SYN requests with
tcp_window_size 1024 and gets ACK responses from the RTU with tcp_window_size 0
because it is overwhelmed. Due to the large number of inquiries and impending overload
similar behaviour could be seen in the vulnerability scan data. Thus the tcp_win_size
feature seems to be well suited to detect the port and Nessus vulnerability scan because
they lead to situations when the receiver is overwhelmed. Then it will advertise a zero
window size, which enables detection of these two attacks.
The missing of data can also be caused by attacks: during the Syn Flood attack hping
tried to send as many SYN requests to a device in the test station as possible which
caused them to crash. There the data mainly showed the SYN requests, which announced
a tcp_window_size of 1024 bytes. Due to the overwhelming count of requests, no answers
from the RTU were received which resulted in missing x104apci and x104asdu val-
ues. These fields were also missing in the Nessus packets because there could only be
two IEC 60870-5-104 APCI packets be found in the data. During the attack Nessus
also overwhelmed the network with encrypted traffic and HyperText Transfer Protocol
(HTTP) requests.
The x104rx and x104tx counters could be used to detect the fuzzy attack: the x104rx
and x104tx counter start at zero and increase with each packet sent or received. They only
get reset when a new connection is established. During the fuzzy test, a new connection
attempt happens from the attackers laptop to the RTU. Therefore the x104rx and x104tx
counter values at the Fuzzy test are very low, in contrast to normal operation mode where
connections usually exist for a long time.
Table 14 Summary of detection results of the four different approaches for the two-class setting
Detection method False positive packets Undetected attack packets
Snort 0 823
Supervised 0 31
Semi-supervised 136 56
Unsupervised 6211 2880
if a network packet exactly matches the pattern of one of the activated rules but does not
consider other deviations of the normal system, which occur in the cause of the attack,
as unusual. To improve the detection rate of the signature-based method in the SCADA
data set used in this paper, it would also be necessary to develop additional rules to better
meet the requirements of the test system but this requires a tremendous amount of work
and extensive knowledge of the network.
As the proposed attacks involve timing, format, and protocol violations, we intend to
extend this work to explore additional features that consider these elements in making
the intrusion detection decision. Improved performance, especially considering the unsu-
pervised approach, will be necessary in order to maintain the same accuracy in a more
complex environment comprised of multiple RTUs and SCADA systems. The data sets
only covered short time ranges, therefore more data will be needed to achieve this. In a
next step, it will be necessary to also catch traffic during re-configuration or outage of
network devices. Furthermore the reasons for missing data points have to be investigated.
The consideration of other protocols than IEC 60870-5-104 was basically out of scope of
this paper but because of the promising results that the attack detection showed it could
be considered in further researches. Especially an extension to IEC 61850 would be inter-
esting because this specific protocol is widely used for automation tasks by distribution
system operators (Khodabakhsh et al. 2020).
The novelty is in the comparison of intrusion detection capabilities between machine
learning approaches and a signature based NIDS by applying them to network traffic,
which resembles the behaviour of a real substation. This work can be seen as a foundation,
and encourage the future exploration of more complex SCADA systems, more difficult
attack vectors, and more advanced machine learning methods to discriminate attacks on
critical infrastructures based on the IEC 60870-5-104 protocol.
Abbreviations
APCI: Application protocol control information. 5, 14; APDU: Application protocol data unit. 4, 5; APG: Austrian power grid
AG. 2, 6; ASDU: Application service data unit. 5, 8; AUC: Area under curve. 12, 13, 15; DNS: Domain name system. 10; DoS:
Denial of Service. 3, 10, 15; FPR: False positive rate. 13; HTTP: HyperText transfer protocol. 14; ICMP: Internet control
message protocol. 5; ICS: Industrial control system. 1, 4, 7, 15; IDS: Intrusion detection system. 12, 13, 15; IEC: International
electrotechnical commission. 1, 8, 10, 11, 14, 16; IP: Internet Protocol. 4, 5, 7, 9; LAN: Local area network. 6; LSTM: Long
short term memory. 3; MITM: Man-In-The-Middle. 2; NIDS: Network intrusion detection system. 5, 10, 15, 16; NTP: Network
time protocol. 6; OSI: Open systems interconnection. 7; ROC: Receiver operating curve. 13; RTU: Remote terminal units. 4,
6, 7, 10, 14, 16; SCADA: Supervisory control and data acquisition. 2, 7, 15, 16; SIS: Safety instrumented system. 3; SVM:
Support vector machine. 3, 11, 13, 15; TCP: Transmission control protocol. 4, 5, 8, 10; TLS: Transport layer security. 10; TPR:
True positive rate. 13; TTL: Time to live. 10; UDP: User datagram protocol. 3, 5; VLAN: Virtual local area network. 9; WAN:
Wide area network. 6
Authors’ contributions
This paper was written by Michael Egger (50%), Günther Eibl (45%) and Dominik Engel (5%). The detailed contributions
are as follows: The idea for the paper was developed by Michael Egger (75%) and Dominik Engel (25%). Experiments and
data collection were done by Michael Egger (100%). Snort was applied and evaluated by Michael Egger (100%). Features
were generated by Günther Eibl (100%), supervised, semi-supervised and unsupervised learning methods were applied
and evaluated by Günther Eibl (100%). The corresponding sections were mostly written by them. Writing of the rest of
the paper by sections fixing the order (Michael Egger, Günther Eibl, Dominik Engel): Abstract: (50%, 45%, 5%),
Introduction (35%, 40%, 25%), Related Work (45%, 45%, 10%), Background (75%, 10%, 15%), Discussion of results (60%,
25%, 15%), Conclusion and future work (20%, 50%, 30%). The author(s) read and approved the final manuscript.
Funding
Günther Eibl and Dominik Engel gratefully acknowledge funding by the Federal State of Salzburg under the WISS2025
program. Publication costs were covered by the DACH+ Energy Informatics Conference Organizers, supported by the
Swiss Federal Office of Energy.
Competing interests
The authors declare that they have no competing interests.
Author details
1 Austrian Power Grid AG, IZD-Tower, Wagramer Str. 19, Vienna, Austria. 2 Salzburg University of Applied Sciences, Center
References
Ang CKG, Utomo NP (2017) Cyber security in the energy world. In: 2017 Asian Conference on Energy, Power and
Transportation Electrification (ACEPT). IEEE, Singapore
Berthier R, Sanders WH, Khurana H (2010) Intrusion detection for advanced metering infrastructures: Requirements and
architectural directions. In: 2010 First IEEE International Conference on Smart Grid Communications. IEEE, Gaithersburg
Butt UJ, Abbod M, Lors A, Jahankhani H, Jamal A, Kumar A (2019) Ransomware threat and its impact on SCADA. In: 2019
IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). IEEE, London
Cherepanov A (2017) Win32/industroyer a new threat for industrial control systems. techreport, ESET. https://www.
welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf
CISA (2019) Mar-17-352-01 hatman - safety system targeted malware (update b). techreport, U.S. Department of
Homeland Security. https://us-cert.cisa.gov/sites/default/files/documents/MAR-17-352-01%20HatMan%E2%80
%94Safety%20System%20Targeted%20Malware_S508C.pdf
Czechowski R, Wicher P, Wiecha B (2015) Cyber security in communication of SCADA systems using IEC 61850. In: 2015
Modern Electric Power Systems (MEPS). IEEE, Wroclaw
Falliere N, Murchu LO, Chien E (2011) W32.stuxnet dossier [Whitepaper]. https://nsarchive2.gwu.edu//NSAEBB/
NSAEBB424/docs/Cyber-044.pdf
Feng C, Li T, Chana D (2017) Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and
LSTM Networks. In: 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
IEEE, Denver. pp 261–272
Hoeve M (2013) Detecting intrusions in encrypted control traffic. In: Proceedings of the First ACM Workshop on Smart
Energy Grid Security - SEGS 2013. ACM Press, New York
IEC (2006) Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101
using standard transport profiles. IEC 60870-5-104:2006. IEC, Geneva
Jiang J, Yasakethu L (2013) Anomaly detection via one class SVM for protection of SCADA systems. In: 2013 International
Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE, Beijing
Khodabakhsh A, Yayilgan SY, Houmb SH, Hurzuk N, Foros J, Istad M (2020) Cyber-security gaps in a digital substation:
From sensors to SCADA. In: 2020 9th Mediterranean Conference on Embedded Computing (MECO). IEEE, Budva
Matoušek P (2017) Description and analysis of iec 104 protocol. techreport. Faculty of Information Technology BUT, Brno
University of Technology
Maynard P, McLaughlin K, Haberler B (2014) Towards understanding man-in-the-middle attacks on IEC 60870-5-104
SCADA networks. In: 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. BCS Learning &
Development, Niederösterreich
MITRE (2020) ATT&CK for Industrial Control Systems. https://collaborate.mitre.org/attackics/index.php/Main_Page.
Accessed 01 June 2020
Pacho C (2016) IEC 60870-5-104 Protocol Detection Rules. https://blog.snort.org/2016/12/iec60870-5-104-protocol-
detection-rules.html. Accessed 22 May 2020
Peterson D (2009) Quickdraw: Generating security log events for legacy SCADA and control system devices. In: 2009
Cybersecurity Applications & Technology Conference for Homeland Security. IEEE, Washington
Phillips B, Gamess E, Krishnaprasad S (2020) An evaluation of machine learning-based anomaly detection in a SCADA
system using the modbus protocol. In: Proceedings of the 2020 ACM Southeast Conference. ACM, Tampa
Pliatsios D, Sarigiannidis P, Lagkas T, Sarigiannidis AG (2020) A survey on SCADA systems: Secure protocols, incidents,
threats and tactics. IEEE Commun Surv Tutor 22:1–1
Roesch M, Green C, Cisco, Team S (2020) SNORT Users Manual 2.9.16. https://www.snort.org/#documents. Accessed 22
May 2020
Schölkopf B, Williamson R, Smola A, Shawe-Taylor J, Piatt J (2000) Support vector method for novelty detection. In:
Advances in Neural Information Processing Systems. Proceedings of the 12th International Conference on Neural
Information Processing, Denver. pp 582–588
Skoko V, Atlagic B, Isakov N (2014) Comparative realization of IEC 60870-5 industrial protocol standards. In: 22nd
Telecommunications Forum Telfor (TELFOR). IEEE, Belgrade
Vadari M (2020) Electric System Operations : Evolving to the Modern Grid. Artech House, Boston
Yan Y, Qian Y, Sharif H, Tipper D (2012) A survey on cyber security for smart grid communications. IEEE Commun Surv
Tutor 14(4):998–1010
Yang Y, McLaughlin K, Littler T, Sezer S, Pranggono B, Wang HF (2013) Intrusion detection system for IEC 60870-5-104
based SCADA networks. In: 2013 IEEE Power & Energy Society General Meeting. IEEE, Vancouver
Yoon M-K, Ciocarlie G (2014) Communication Pattern Monitoring: Improving the Utility of Anomaly Detection for
Industrial Control Systems. In: NDSS Workshop on Security of Emerging Networking Technologies, San Diego.
pp 1–10. https://doi.org/10.14722/sent.2014.23012
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
1. use such content for the purpose of providing other users with access on a regular or large scale basis or as a means to circumvent access
control;
2. use such content where to do so would be considered a criminal or statutory offence in any jurisdiction, or gives rise to civil liability, or is
otherwise unlawful;
3. falsely or misleadingly imply or suggest endorsement, approval , sponsorship, or association unless explicitly agreed to by Springer Nature in
writing;
4. use bots or other automated methods to access the content or redirect messages
5. override any security feature or exclusionary protocol; or
6. share the content in order to create substitute for Springer Nature products or services or a systematic database of Springer Nature journal
content.
In line with the restriction against commercial use, Springer Nature does not permit the creation of a product or service that creates revenue,
royalties, rent or income from our content or its inclusion as part of a paid for service or for other commercial gain. Springer Nature journal
content cannot be used for inter-library loans and librarians may not upload Springer Nature journal content on a large scale into their, or any
other, institutional repository.
These terms of use are reviewed regularly and may be amended at any time. Springer Nature is not obligated to publish any information or
content on this website and may remove it or features or functionality at our sole discretion, at any time with or without notice. Springer Nature
may revoke this licence to you at any time and remove access to any copies of the Springer Nature journal content which have been saved.
To the fullest extent permitted by law, Springer Nature makes no warranties, representations or guarantees to Users, either express or implied
with respect to the Springer nature journal content and all parties disclaim and waive any implied warranties or warranties imposed by law,
including merchantability or fitness for any particular purpose.
Please note that these rights do not automatically extend to content, data or other material published by Springer Nature that may be licensed
from third parties.
If you would like to use or distribute our Springer Nature journal content to a wider audience or on a regular basis or in any other manner not
expressly permitted by these Terms, please contact Springer Nature at