The protocol violation detection engine
Generally, protocol violations can be identified by field values and packet structures that are being used in ways that go against the ICS protocol specifications.
In Figure 8.1, we can see Modbus Exception as an example of something picked up by the protocol violation engine. A secondary device did not send a response to the primary device when sending the exception code. This violation of the protocol was detected by MDIoT:
Figure 8.1 – Example of a protocol violation
Note
In the MDIoT portal for the Modbus alert, the primary device is referred to as the master device, and the secondary as the slave. However, due to their unsavory connotations dating back to colonization, standardization organizations have spoken against the usage of these terms. We have used primary and secondary in this book, but there are various alternatives available, such as controller-responder and primary-replica. You can read more...