USA: +1(715)227-4880, UK: +44-7896988486, AU:+61-452503850


Computing Skills Assignment Help

Matlab Assignment Help

CS6263: Cyber Physical System Security

CS6263: Cyber Physical System Security

CS6263: Introduction to Cyber Physical System Security



Environment Setup

 The second mini project will be based on Industrial Network Protocols, speci cally the Modbus protocol. Please follow the instructions carefully to set up the project environ-ment:

 We will be using Mininet for the project. Pre-built VM images including Mininet and other useful software is provided in the following link : Mininet VM.

 Once the download is complete, import the VM onto VirtualBox (or any other VMM) by double-clicking the .ovf le.

 Turn on the VM. When prompted to login, use the following details: { Login: mininet{ Password: mininet

 To get a GUI, on the command line type the following : { sudo apt-get update

 { sudo apt-get install xinit ubuntu-desktop (this takes a while) { startx

 { Ctrl+Alt+T to get a terminal. Type : rm   rf  =:config

 We will also be using Wireshark, a packet analyser, in the project. It has been installed in the VM by default. Please update it to the last version. If you could not nd it, download the last version of Wireshark from here:



 Download the Modbus tk library from Modbus tk. Go through the examples on the same Github page. They are very helpful.

 Here are some other useful documentation on Modbus protocol: link 1; link 2; link 3.





In the previous project, we have learned how to read, write and modify a Ladder Logic program. This is a very important skill to have as an attacker when trying to compromise an ICS network through PLCs. But before you can do that you need to have knowledge of the network such as the number of nodes communicating, the processes they are running, etc. Then, you can send malicious commands with the same protocol and perform severe sabotage. Since most of the ICS protocols are communicating with plain text, it is very easy to launch attacks on these systems. As the rst step, an attacker would rst perform reconnaissance on the network by collecting and analyzing the network tra c.


1  Part 1 (40 Points)


Download the modbus capture.pcapng le from Canvas. This le contains communication between several devices running the Modbus protocol. Assume there is a reactor within a reactor chamber. The target process is to control the reactor temperature and maintain it around 100 C. There are two valves connected to the reactor chamber. One valve lls the reactor chamber and the other valve drains the reactor chamber. There is a master device. The master toggles coils on a PLC to simulate the opening or closing of one of the two valves in order to regulate the temperature. The master also randomly writes a set point on the PLC. This writing of set point is to indicate that the master is tweaking the reactor temperature in order to optimize the reactor functioning. Note that there might be some other unknown sensors in the process and pcap le. Use Wireshark to analyze the given pcap le and answer the following questions:


1.  How many di erent devices can you identify? Mention what role they play in the reactor example described above.


2.  How many registers can you identify on each device?


3.  What type of registers are being accessed on each device?


4.  Which PLC and Modbus reference/register addresses are used to control the tem-perature set point and valves?


Brie y state your reasoning behind each answer.


2  Part 2 (60 Points)


Now that you have understood and identi ed the di erent devices and registers from the pcap le, recreate the setup you have seen in part 1 using run simulation.py. Modify the Modbus master (tcp master.py) to set the temperature really high and close both the valves, attempting to cause an explosion. Pseudo codes for both Master and slave are provided in tcp master.py and tcp slave.py, respectively. Use Wireshark to capture the tra c between the master and the slaves and submit the pcap (name it Part2.pcap).



 State and explain brie y your assumptions/reasoning. Note that you should create the network exactly the same as part 1; however, you do not need to simulate sensor readings. Simulating the malicious write commands would be su cient to get the full credit of this part.

 Deliverables and Submission Instructions

 pdf le named Project 2.pdf with all your answers and explanations; simulation.py, tcp master.py, and tcp slave.py.

 Create a zip le with your name (John Doe.zip), that includes all your ladder logic les and submit it on Canvas. Note that failure to follow the submission instructions will cause unnecessary points loss.




  • Number of views:
  • PRICE :
    AU$ 100.00
Security Code  
Urgent Assignment Help

Our Top Experts

Karen Betty

Holding a PhD degree in Finance, Dr. John Adams is experienced in assisting students who are in dire need...

55 - Completed Orders

Daphne Lip

Canada, Toronto I have acquired my degree from Campion College at the University of Regina Occuption/Desi...

52 - Completed Orders

Mr Roberto Tuzii

Even since I was a student in Italy I had a passion for languages, in fact I love teaching Italian, and I...

102 - Completed Orders

Harsh Gupta

To work with an organization where I can optimally utilize my knowledge and skills for meeting challenges...

109 - Completed Orders


JOB OBJECTIVE Seeking entry level assignments in Marketing & Business Development with an organization...

202 - Completed Orders


Current work profile Project manager- The Researchers Hub (2nd Jan 2016 to presently working) Researc...

20 - Completed Orders

Tan Kumar Ali

Sales Assistant, Mito Marina Assigned to the Stationery dept – assisted in merchandising, stock taking...

100 - Completed Orders

Wesenu Irko

Personal Profile Dedicated and highly experienced private chauffeur. High energy, hardworking, punctua...

200 - Completed Orders

Lizzy Darley

I'm Lizzy, full time education specialist in English, Essay Writing, Economics and Maths. Having Assi...

109 - Completed Orders


HSC PREPARATION I specialise in English coaching programs for HSC students. My personalised and results-...

202 - Completed Orders