June 24, 2017
June 24, 2017
June 28, 2017
Using Mini Protocol stacks to guide research Authors: Dr.Patrick Appiah-Kubi, Anand Richard DNP3 (Distributed Network Protocol) is a fairly recent protocol having been standardized by the IEEE 1815 standard in 2009. It is employed predominantly in the electric utility industry and networks. The advent of DNP3 over TCP/IP made it available on the internet making it the target of several researchers and organizations who announced exploits and hacks against it. In the period 2007 to 2009 there were 27 attacks1. In this paper we present an out of the box approach for making DNP3 devices more secure using a split protocol design. Such a design can be selectively deployed in the most important and vulnerable parts of a utility network contributing to cost and time savings. We show that the split protocol design will provide a way for DNP3 network designers to use the ‘Data Server’ and ‘Connection Server’ paradigm to configure redundant DNP3 devices that can remain hidden and ready to take up tasks in the event of an attack.
1. S. East, J. Butts, M. Papa, and S. Shenoi, “A Taxonomy of Attacks on the DNP3 Protocol,” Critical Infrastructure Protection III, pp. 67–81, 2009.
Richard, A., & Appiah-Kubi, P. (2017, June), Using Mini Protocol Stacks to Guide Research Paper presented at 2017 ASEE Annual Conference & Exposition, Columbus, Ohio. https://peer.asee.org/29082
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2017 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015