Table 4: Final list of the correlated communication packets between the two systems.
Packet ID Source IP Server IP Payload Attack Vector Impact Status
MODBUS7 192.168.0.57 192.168.0.3 Modbus FORCE LISTEN ONLY MODE Denial of Service Failed
MODBUS9 192.168.0.57 192.168.0.3 Modbus FORCE LISTEN ONLY MODE Denial of Service Failed
MODBUS11 192.168.0.57 192.168.0.3 Modbus FORCE LISTEN ONLY MODE Denial of Service Failed
TCP13 192.168.0.57 192.168.0.3 Non Modbus Non Modbus Communication Specification Violation
MODBUS14 192.168.0.57 192.168.0.3 Modbus RESTART COMMUNICATIONS OPTION Denial of Service Failed
MODBUS16 192.168.0.57 192.168.0.3 Modbus RESTART COMMUNICATIONS OPTION Denial of Service Successful
MODBUS19 192.168.0.57 192.168.0.3 Modbus RESTART COMMUNICATIONS OPTION Denial of Service Successful
TCP21 192.168.0.57 192.168.0.3 Non Modbus Non Modbus Communication Specification Violation
MODBUS22 192.168.0.57 192.168.0.3 Modbus CLEAR AUDIT DIAG REGISTERS System Integrity Successful
MODBUS25 192.168.0.57 192.168.0.3 Modbus CLEAR AUDIT DIAG REGISTERS System Integrity Successful
MODBUS39 192.168.0.57 192.168.0.3 Modbus REPORT SERVER INFORMATION System Reconnaissance Successful
MODBUS42 192.168.0.57 192.168.0.3 Modbus REPORT SERVER INFORMATION System Reconnaissance Successful
The SPARQL query resulted in a total of 29 packet
instances which contain both request and response
Modbus messages. However, different from Snort
IDS, the proposed system extracts the response mes-
sage description about the command execution and
combines this information with the request pair using
a unique message correlation ID. Therefore, the final
list of correlated packets for the selected two systems
is presented in Table 4.
5 CONCLUSION
According to the aforementioned experiments and re-
sults, it is clear that the proposed ontology-based IDS
(OSCIDS) is an effective tool for the detection of
intrusions and malicious industrial communications.
The use of ontology modelling can provide rich se-
mantic logics in the represented intrusion knowledge.
This enables advanced capabilities such as reason-
ing and deriving additional useful information from
the existing knowledge, that is beyond the traditional
IDS systems which utilise basic taxonomy represen-
tations. Furthermore, the correlation between packets
or attacks can be made using flexible features that are
not limited to the raw packet information (e.g., Source
IP address) but can utilise the semantic meaning of
the data (e.g., the impact on the system, the purpose
of the command). We intend to apply the proposed
approach on other industrial protocols such as DNP3.
REFERENCES
Barnett, B., Crapo, A., and ONeil, P. (2012). Experiences in
using semantic reasoners to evaluate security of cyber
physical systems. Technical report, GridSec.
Barry, B. I. and Chan, H. A. (2009). Syntax, and semantics-
based signature database for hybrid intrusion detec-
tion systems. Security and Communication Networks,
2(6):457–475.
Carcano, A., Coletta, A., Guglielmi, M., Masera, M.,
Fovino, I. N., and Trombetta, A. (2011). A multi-
dimensional critical state analysis for detecting intru-
sions in scada systems. Industrial Informatics,IEEE
Trans. on, 7(2):179–186.
Chora
´
s, M., Flizikowski, A., Kozik, R., and Hołubowicz,
W. (2010). Decision aid tool and ontology-based rea-
soning for critical infrastructure vulnerabilities and
threats analysis. 4th CRITIS, pages 98–110.
Drias, Z., Serhrouchni, A., and Vogel, O. (2015). Taxonomy
of attacks on industrial control protocols. In ICPE’15,
pages 1–6. IEEE.
Had
ˇ
ziosmanovi
´
c, D., Sommer, R., Zambon, E., and Hartel,
P. H. (2014). semantic security monitoring for indus-
trial processes. In 30th ACSAC, pages 126–135. ACM.
Harris, S., Seaborne, A., and Prudhommeaux, E. (2013).
Sparql 1.1 query language. W3C, 21.
Jena (2011). Jena–a semantic web framework for java. Talis
Systems.
Kang, D.-H., Kim, B.-K., and Na, J.-C. (2014). Cyber
threats and defence approaches in scada systems. In
16th ICACT, pages 324–327. IEEE.
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare
weapon. Security & Privacy, IEEE, 9(3):49–51.
Mallouhi, M., Al-Nashif, Y., Cox, D., Chadaga, T., and
Hariri, S. (2011). A testbed for analyzing security of
scada control systems (tasscs). In IEEE ISGT, pages
1–7. IEEE.
Modbus (2012). Modbus specification v1. 1b3. Modbus
Organization, Inc., April, 26.
Morris, T. H., Jones, B. A., Vaughn, R. B., and Dandass,
Y. S. (2013). Deterministic intrusion detection rules
for modbus protocols. In 46th HICSS, pages 1773–
1781. IEEE.
Peterson, D. (2009). Quickdraw: Generating security log
events for legacy scada and control system devices. In
CATCH’09, pages 227–229. IEEE.
Roesch, M. et al. (1999). Snort ids. In LISA, volume 99,
pages 229–238.
Sartakov, V. A. (2015). Ontological representation of net-
works for ids in cyber-physical systems. In 4th AIST,
pages 421–430. Springer.
Sayegh, N., Elhajj, I. H., Kayssi, A., and Chehab, A. (2014).
Scada intrusion detection system based on temporal
SECRYPT 2016 - International Conference on Security and Cryptography
334