PLC Cyber-Security Challenges in Industrial Networks

Ramiro Ramirez, Chun-Kai Chang, Shunjian Liang
{"title":"PLC Cyber-Security Challenges in Industrial Networks","authors":"Ramiro Ramirez, Chun-Kai Chang, Shunjian Liang","doi":"10.1109/MESA55290.2022.10004463","DOIUrl":null,"url":null,"abstract":"Conveyor belts are vital components in production lines driven by Programming Logic Controllers (PLC). Sensors and actuators control with PLCs represents a critical point in the industrial process. Attacks targeting the exploitation of PLC vulnerabilities have been on the rise recently. This study aims to analyze the vulnerabilities of a typical PLC setup and constructs a PLC testbed environment to represent the cyber attack target. The PLC testbed represents an automatic conveyor belt for sorting materials. Two Mitsubishi FX5U-32M PLCs control the conveyor motor and the sorting mechanism, respectively. The network communication adapted Modbus protocol emulated with ModbusPal and components connected via RS-485, Ethernet, and WiFi. In this study, Ethernet is the main network connection. The main components of the network, attacker, and target, host different Operating Systems. On the attacker side, the selected OS is Kali 2022.3. In contrast, the target side host Ubuntu 22.04. The attacker runs Nmap and Metasploit to exploit the target Modbus registers. The selected attack method for this study is Packet Reply. Packet replies can halt operations sending custom data packets to the PLC. This study provides a basic step-by-step offensive strategy targeting register modification.","PeriodicalId":410029,"journal":{"name":"2022 18th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 18th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MESA55290.2022.10004463","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Conveyor belts are vital components in production lines driven by Programming Logic Controllers (PLC). Sensors and actuators control with PLCs represents a critical point in the industrial process. Attacks targeting the exploitation of PLC vulnerabilities have been on the rise recently. This study aims to analyze the vulnerabilities of a typical PLC setup and constructs a PLC testbed environment to represent the cyber attack target. The PLC testbed represents an automatic conveyor belt for sorting materials. Two Mitsubishi FX5U-32M PLCs control the conveyor motor and the sorting mechanism, respectively. The network communication adapted Modbus protocol emulated with ModbusPal and components connected via RS-485, Ethernet, and WiFi. In this study, Ethernet is the main network connection. The main components of the network, attacker, and target, host different Operating Systems. On the attacker side, the selected OS is Kali 2022.3. In contrast, the target side host Ubuntu 22.04. The attacker runs Nmap and Metasploit to exploit the target Modbus registers. The selected attack method for this study is Packet Reply. Packet replies can halt operations sending custom data packets to the PLC. This study provides a basic step-by-step offensive strategy targeting register modification.
工业网络中的PLC网络安全挑战
传送带是由可编程逻辑控制器(PLC)驱动的生产线的重要部件。用plc控制传感器和执行器代表了工业过程中的一个关键点。最近,针对PLC漏洞的攻击呈上升趋势。本研究旨在分析典型PLC设置的漏洞,并构建PLC测试平台环境来代表网络攻击目标。PLC试验台为物料分拣自动传送带。两台三菱FX5U-32M plc分别控制输送电机和分拣机构。网络通信采用Modbus协议,采用Modbus pal仿真,组件通过RS-485、以太网和WiFi连接。在本研究中,以太网是主要的网络连接。网络的主要组成部分,攻击者和目标,托管不同的操作系统。攻击方选择的操作系统为Kali 2022.3。相反,目标端安装的是Ubuntu 22.04。攻击者运行Nmap和Metasploit来利用目标Modbus寄存器。本研究选择的攻击方式为“报文应答”。报文应答可以停止向PLC发送自定义数据包的操作。本研究提供了一种针对语域修改的基本步进攻击策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信