rate detection of the three IDSs. With the HTTP ex-
periments, the ACK packets with the wrong sequence
numbers are detected and, as with Snort, the first
HTTP injection is detected with ‘SURICATA HTTP
unable to match response to request’. The most inter-
esting alert is ‘SURICATA STREAM reassembly over-
lap with different data’, which exactly describes the
MotS attack. This is displayed for all experiments,
except experiment 3, which related to injecting a re-
played response. Experiment 3 did not trigger any
alerts from Suricata, because the forged payload was
the same as the legitimate one.
7 CONCLUSION
Further work should be performed for each of the
NIDS to include detection alerts for the MotS class of
attacks. While Suricata can detect this, and notify the
operator with a somewhat descriptive name, it fails
to articulate the issue as a malicious action. Network
IDS for deployment within OT networks must have
support for the industrial protocols, otherwise, detec-
tion of these kinds of attacks and others will go unno-
ticed. As discussed in the introduction, zero-trust net-
works, VPNs (to an extent), and TLS are the best mit-
igations of this class of attack. IEC104 is has a com-
panion standard, IEC 62351, detailing securing end
to end communication, however in internal networks,
these defences are often not deployed. In part due to a
lax security mindset, or the additional complexity and
risk of deployment. While this class of attack is miti-
gated for much of the public internet via TLS, critical
network operators need to be aware of the potential
damage this attack may have on a system. Although
deploying a mitigation approach such as zero-trust
networking is the gold standard, many network opera-
tors are not in a position to do so. Threat actors, such
as nation states have used this method successfully
over several years, and it seems likely this approach
will continue to be exploited in the future. Especially
in the ICS domain, where unauthenticated local traffic
such as IEC104 is still commonplace. As the experi-
ments with Zeek, Snort and Suricata have shown, fur-
ther work is required to provide these network IDS
platforms with the detection rules and mechanisms
capable of accurately detecting MotS being exploited
by an intruder.
REFERENCES
Alexander, G., Espinoza, A. M., and Crandall, J. R. (2019).
Detecting TCP/IP Connections via IPID Hash Colli-
sions. Proceedings on Privacy Enhancing Technolo-
gies, 2019(4).
Conti, M., Dragoni, N., and Lesyk, V. (2016). A Survey of
Man In The Middle Attacks. IEEE Communications
Surveys & Tutorials.
DeCusatis, C., Liengtiraphan, P., Sager, A., and Pinelli, M.
(2016). Implementing Zero Trust Cloud Networks
with Transport Access Control and First Packet Au-
thentication. In 2016 IEEE International Conference
on Smart Cloud (SmartCloud).
Dragos (2017). CRASHOVERRIDE - Analysis of the
Threat to Electric Grid Operations. Technical report,
Dragos, Inc.
Forrester (2013). Developing a Framework to Improve Crit-
ical Infrastructure Cybersecurity. Technical report,
NIST.
Gallagher, R. and Greenwald, G. (2014). How the NSA
Plans to Infect ‘Millions’ of Computers with Malware.
Gilad, Y. and Herzberg, A. (2014). Off-Path TCP Injection
Attacks. ACM Transactions on Information and Sys-
tem Security.
Gilad, Y. and Herzberg, A. (Auguest 2012). Off-Path At-
tacking the Web. In 6th USENIX Workshop on Offen-
sive Technologies.
Green, B., Krotofil, M., and Abbasi, A. (2017). On the
Significance of Process Comprehension for Conduct-
ing Targeted ICS Attacks. In Proceedings of the 2017
Workshop on Cyber-Physical Systems Security and
PrivaCy, CPS ’17.
Haagsma, L. (2015). Deep dive into QUANTUM INSERT.
Hjelmvik, E. (2015). Covert Man-on-the-Side Attacks.
International Electrotechnical Commission (2006). EN
60870-5-104:2006. Technical report, British Stan-
dards Institution.
Johnson, B., Caban, D., Krotofil, M., Scali, D., Brubaker,
N., and Glyer, C. (2017). Attackers Deploy New ICS
Attack Framework TRITON and Cause Operational
Disruption to Critical Infrastructure.
Marczak, B., Weaver, N., Dalek, J., Ensafi, R., Fifield, D.,
McKune, S., Rey, A., Scott-Railton, J., Deibert, R.,
and Paxson, V. (2015). An Analysis of China’s “Great
Cannon”. In 5th USENIX Workshop on Free and Open
Communications on the Internet. USENIX Associa-
tion.
Maynard, P., McLaughlin, K., and Haberler, B. (2014). To-
wards Understanding Man-In-The-Middle Attacks on
IEC 60870-5-104 SCADA Networks. In ICS-CSR.
Nakibly, G., Schcolnik, J., and Rubin, Y. (2016). Website-
Targeted False Content Injection by Network Opera-
tors. In USENIX Security Symposium.
National Grid (2013). Response to NIST: “Developing a
Framework to Improve Critical Infrastructure Cyber-
security. Technical report, National Grid.
Schneier, B. (2013). Attacking Tor: How the NSA targets
users’ online anonymity. The Guardian.
Trammell, B., Huitema, C., Schneier, B., Jennings, C.,
Borkmann, D., Barnes, R., and Hardie, T. (2015).
Confidentiality in the Face of Pervasive Surveillance:
A Threat Model and Problem Statement.
Weaver, N., Sommer, R., and Paxson, V. (2009). Detecting
Forged TCP Reset Packets. In NDSS.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
294