{"title":"Function code based vulnerability analysis of DNP3","authors":"Chetna Singh, Ashwin Nivangune, M. Patwardhan","doi":"10.1109/ANTS.2016.7947865","DOIUrl":null,"url":null,"abstract":"Distributed Network Protocol (DNP 3.0) is a reliable and an efficient open standard SCADA communication protocol predominantly used in the Energy Sector in USA. Due to its exhaustive specification and complex implementation it becomes essential to perform vulnerability analysis. The paper highlights attack surface specific to function codes present in Data Link and Application layer of the protocol stack. In order to realize the attack scenarios we have extended Scapy tool to add on DNP3 protocol stack. We have presented attack scenarios based on packet fabrication and packet modification threat categories. The subsequent findings and analysis of our work will help in developing DNP3/TCP based Protocol Validation tool to check the vendor implementation of the protocol. Further, it can also serve as Vulnerability Assessment and Penetrating Testing (VAPT) tool.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS.2016.7947865","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
Distributed Network Protocol (DNP 3.0) is a reliable and an efficient open standard SCADA communication protocol predominantly used in the Energy Sector in USA. Due to its exhaustive specification and complex implementation it becomes essential to perform vulnerability analysis. The paper highlights attack surface specific to function codes present in Data Link and Application layer of the protocol stack. In order to realize the attack scenarios we have extended Scapy tool to add on DNP3 protocol stack. We have presented attack scenarios based on packet fabrication and packet modification threat categories. The subsequent findings and analysis of our work will help in developing DNP3/TCP based Protocol Validation tool to check the vendor implementation of the protocol. Further, it can also serve as Vulnerability Assessment and Penetrating Testing (VAPT) tool.