REAL-TIME DETECTION OF MALICIOUS LOGIC INJEC-TION IN SCADA SYSTEMS USING HYBRID YARA SIGNA-TURES

Authors:

Gulab Kumar Mondal,Arijit Das,Moumita Pal,Biswarup Neogi,DharamPal Singh,

DOI NO:

https://doi.org/10.26782/jmcms.2026.02.00003

Keywords:

SCADA Security,Industrial Control Systems (ICS),YARA,Logic,Modbus,TCP,Host-Based Intrusion Detection,Static Analysis,OT Cybersecurity,

Abstract

Modern Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks face a growing class of logic-layer attacks in which adversaries silently manipulate configuration or project files instead of deploying traditional malware. Existing defences, such as network intrusion de-tection systems and machine-learning-based anomaly detectors, struggle to ob-serve these pre-deployment logic changes and often incur high operational complexity. This paper presents a lightweight, host-based framework that uses YARA, a rule-based pattern-matching engine, to perform static inspection of XML configuration files generated by SCADA engineering tools. The proposed system is implemented on a Windows 10 engineering workstation using Mod-busPal as a Modbus TCP simulator, Python for file monitoring and GUI devel-opment, and YARA CLI/Python bindings for rule execution. Custom YARA rules are crafted to detect unauthorized Modbus function code 5 (Write Single Coil) operations targeting critical coil addresses, modelling malicious logic injections such as covert actuator activations. In a controlled lab environment, using a va-riety of ModbusPal project files, a combination of benign (no infiltration) and tampered project files, as well as our detection framework, achieved less than 200 milliseconds of latency for detecting true positives (and 0 false positives and 0 false negatives) for the defined ruleset and under a negligible resource over-head. These findings indicate that static logic validation at the host-level would fulfil an effective integrity pre-deployment check for PLC logic in addition to current network-based and behaviour-based ICS security mechanisms, without requiring modification of the installed PLC hardware and network protocol.

Refference:

I. Adepu, M., and A. Mathur. “SCADAhunt: Framework for Detecting Pro-cess Control Attacks.” International Journal of Critical Infrastructure Protection, vol. 19, 2017. https://www.sciencedirect.com/science/article/pii/S1874548217300279

II. Cheminod, M., L. Durante, and A. Valenzano. “Review of Security Issues in Industrial Networks.” IEEE Transactions on Industrial Informatics, vol. 9, no. 1, 2013, pp. 277–293. 10.1109/TII.2012.2198666

III. Chung, S. P., et al. “Host-Based Detection of ICS Configuration Tamper-ing.” Proceedings of the Annual Computer Security Applications Confer-ence (ACSAC), 2022. 10.1145/3564625.3564629

IV. Claroty Team82. “MITRE ATT&CK for ICS: Detecting Logic Manipula-tion TTPs.” Claroty Research, 2024. https://claroty.com/team82/research

V. Costin, A. “Towards a Framework for ICS Intrusion Detection.” Black Hat USA, 2020. https://www.blackhat.com/us-20/

VI. Dragos. “FrostyGoop: Modbus Malware Targeting Coils.” ICS Threat De-tection Bulletin, 2024. https://www.dragos.com/

VII. Dragos, Inc. “INCONTROLLER (PIPEDREAM): Highly Capable ICS Toolkit.” Threat Intelligence Report, Apr. 2022. https://www.dragos.com/resources/

VIII. Dressler, F., and P. Sommer. “Using Zeek for ICS Protocol Detection.” Proceedings of the 9th USENIX Workshop on Cyber Security Experimen-tation and Test (CSET), 2021. https://www.usenix.org/conference/cset21

IX. ENISA. “Threat Landscape for Industrial Control Systems.” ENISA Threat Report, 2025. https://www.enisa.europa.eu/publications

X. Forescout Research. The State of Modbus Security. Forescout Labs Tech-nical Brief, 2023. https://www.forescout.com/resources/

XI. Ike, H., et al. “SCAPHY: Behavior-Aware ICS Security Using Physical Traces.” Proceedings of the IEEE International Conference on Industrial Cyber-Physical Systems, 2022. https://ieeexplore.ieee.org/

XII. ICS-CERT. “Advisory (ICS-ALERT-14-281-01) — BlackEnergy Mal-ware.” U.S. Department of Homeland Security, 2014. https://www.cisa.gov/news-events/ics-alerts/ics-alert-14-281-01

XIII. ICS-CERT. “Havex Malware Targeting ICS/SCADA Systems.” Industrial Control Systems Cyber Emergency Response Team, 2013. https://www.cisa.gov/ics

XIV. Kravchik, M., and A. Shabtai. “Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks.” Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2018. 10.1145/3264888.3264896

XV. Langner, R. “Stuxnet: Dissecting a Cyberwarfare Weapon.” IEEE Securi-ty & Privacy, vol. 9, no. 3, 2011, pp. 49–51. 10.1109/MSP.2011.67

XVI. Mandiant. “FrostyGoop ICS Malware Technical Analysis.” Mandiant Threat Intelligence, 2024. https://www.mandiant.com/resources

XVII. McLaughlin, S., et al. “The Cybersecurity Landscape in Industrial Con-trol Systems.” Proceedings of the IEEE, vol. 104, no. 5, 2016, pp. 1039–1057. 10.1109/JPROC.2015.2512235

XVIII. Modbus Organization. “Modbus Application Protocol Specification V1.1b3.” 2015. http://modbus.org/docs/Modbus_Application_Protocol_V1_1b3.pdf

XIX. NIST. Guide to Industrial Control Systems (ICS) Security. SP 800-82 Re-vision 3, 2025. https://csrc.nist.gov/publications/detail/sp/800-82/rev-3/final

XX. Nguyen, N., T. Ogawa, and M. Saito. “Integrity Verification for PLC Log-ic Files Using Lightweight Hash Trees.” IEEE Transactions on Industrial Informatics, vol. 21, no. 2, 2025, pp. 1204–1213. https://ieeexplore.ieee.org/

XXI. Searle, J., et al. “LogicLocker: Ransomware for Programmable Logic Controllers.” Georgia Tech ICS Security Lab, 2017. https://arxiv.org/

XXII. TXOne Networks. “PIPEDREAM Local Exploit Analysis.” TXOne Threat Research, 2025. https://www.txone.com/blog/

View Download