Obstructing PLC Operations through Modbus Command Manipulation

説明

Security vulnerabilities in Programmable Logic Controllers (PLCs) within Industrial Control Systems (ICS) using the Modbus/TCP protocol pose significant risks, particularly through stop-and-start command injection attacks that impact PLC operations and cause severe industrial consequences. Supported by Taiwan's National Science and Technology Council (NSTC) and the Water Resources Agency, this research establishes a cybersecurity testbed for water resource systems to investigate these threats. Unauthorized or forged commands are shown to manipulate PLC configurations and ladder logic diagrams, revealing critical weaknesses. Flowchart analyses and Modbus packet examinations highlight the risks and offer actionable insights into effective defense mechanisms for enhancing ICS security.

収録刊行物

詳細情報 詳細情報について

  • CRID
    1390585492991967872
  • DOI
    10.5954/icarob.2025.os7-6
  • ISSN
    21887829
  • 本文言語コード
    en
  • データソース種別
    • JaLC
  • 抄録ライセンスフラグ
    使用不可

問題の指摘

ページトップへ