1. Introduction
The rapid expansion of the Internet of Things (IoT) has transformed modern technological infrastructures by enabling billions of devices to communicate, exchange data, and automate decision-making processes [
1]. This transformation is particularly evident in industrial environments through the emergence of the Industrial Internet of Things (IIoT) and the concept of Industry 4.0 [
2], where sensors, controllers, and machines are interconnected to enable smart manufacturing, predictive maintenance, and the real-time monitoring of industrial processes. It has been shown in industrial reports and news that more than 65% of manufacturing companies have integrated IIoT technologies into their production systems and that approximately 70% of industrial processes rely on connected devices for monitoring and automation [
3]. While these technologies significantly improve efficiency and productivity, they also introduce major cybersecurity challenges [
4]. Industrial systems have traditionally been designed by control engineers who prioritize reliability and real-time performance rather than cybersecurity practices, resulting in many industrial networks lacking strong authentication, encryption, and intrusion detection mechanisms [
5].
Among the various components used in industrial automation systems, the programmable logic controller (PLC) is considered the most widely deployed control device in industrial control systems [
6]. PLCs are responsible for monitoring sensors, executing control logic, and actuating industrial equipment in real-time. It has been reported that the global PLC market was valued at more than USD 14 billion and is expected to exceed USD 22 billion by 2030 [
7]. Furthermore, more than 41 million PLC units were deployed worldwide in 2023 [
8]. PLCs are widely used in several industrial sectors, including manufacturing [
9], energy [
10], transportation [
11], and water treatment [
12]. In addition, PLCs are the core components of distributed control systems and SCADA frameworks [
13]. The widespread adoption of PLCs makes them a critical component of industrial infrastructures, and consequently, an attractive target for cyber attackers seeking to disrupt industrial operations [
14].
With the evolution of IIoT architectures, PLCs are increasingly connected to enterprise networks, and in some cases, directly to the Internet to enable remote monitoring, diagnostics, and maintenance [
15]. In many industrial environments, PLC communication over Ethernet relies on the widely used ModbusTCP protocol due to its simplicity, vendor interoperability, and ease of integration with supervisory control systems and industrial software platforms [
16]. As a result, ModbusTCP has become one of the most commonly used protocols in industrial communication networks. However, the protocol was originally designed without strong security features such as encryption or robust authentication mechanisms. Consequently, PLC devices communicating over ModbusTCP may become vulnerable to various attacks, including brute-force authentication attempts, packet sniffing, and denial-of-service attacks, especially when deployed in IIoT environments with increased network exposure.
To address these challenges, this work introduces a deception-based protection mechanism implemented directly within the PLC logic. Unlike traditional industrial honeypots that simulate PLC behavior on external computers or virtual systems, the proposed PLC misleading algorithm (PMA) operates inside the real PLC and dynamically generates misleading responses to unauthorized authentication attempts. This approach allows the PLC to maintain normal operation for legitimate clients while disrupting automated brute-force attacks by returning randomized authentication outcomes. Moreover, the proposed mechanism is designed to be lightweight and suitable for resource-constrained PLC environments, requiring only a small portion of the available PLC memory and no additional hardware or external security infrastructure. As a result, PMA provides a practical and deployable security enhancement for IIoT environments where many legacy PLCs lack strong built-in cybersecurity mechanisms.
The main contributions of this work are summarized as follows:
- 1-
Design and implementation of the PLC misleading algorithm (PMA): a lightweight deception-based protection mechanism embedded directly into PLC that generates misleading authentication responses to disrupt automated brute-force attacks without modifying the ModbusTCP protocol.
- 2-
A comprehensive empirical analysis of ModbusTCP authentication weaknesses, including vendor-specific function exploitation.
- 3-
A fully embedded deception-based authentication mechanism implemented in PLC ladder logic without external components.
- 4-
A multi-scenario experimental evaluation across different PLC families and distributed attack conditions.
- 5-
A system-level analysis of PLC resource limitations and their security implications.
- 6-
A comparative discussion positioning PMA relative to protocol-level and network-level defenses.
The rest of this paper is organized as follows.
Section 2 reviews related work on ModbusTCP security and industrial honeypots.
Section 3 introduces the PMA algorithm and describes its design and operation.
Section 4 presents the experimental setup, while
Section 5 discusses the obtained results. Finally,
Section 6 concludes the paper and outlines future research directions.
3. The PLC Misleading Algorithm (PMA) Architecture
3.1. Overview and Design Principles
PMA is a lightweight algorithm implemented in ladder (LAD) logic, adding approximately 50 rungs to existing PLC programs with negligible impact on ModbusTCP latency. It integrates authentication and deception directly within the controller to protect against brute-force and denial-of-service (DoS) attacks.
Unlike traditional honeypots deployed on external systems, PMA operates inside the real PLC. It does not block unauthorized access but instead detects abnormal behavior and returns controlled misleading responses. This embedded design significantly increases the difficulty of distinguishing between legitimate and deceptive interactions. The overall logic of PMA is summarized in Algorithm 1.
3.2. Attack Detection and Deception Mechanism
As shown in Algorithm 1, PMA uses hidden registers, timers, and counters to detect abnormal password attempts. Passwords are stored in internal registers that are not accessible via ModbusTCP, while temporary registers store captured values during attack attempts.
| Algorithm 1: PLC Security Algorithm for Password Attempts and Access Control |
![Futureinternet 18 00259 i001 Futureinternet 18 00259 i001]() |
The detection mechanism in PMA is based on monitoring the rate of authentication attempts using counters and timers. An attack is detected when the number of attempts exceeds a predefined threshold within a specific time window. Therefore, the detection latency (time-to-detection) is directly influenced by the attack rate. Higher-rate attacks trigger detection rapidly, while lower-rate attacks may delay activation of the deception mechanism. PMA is primarily designed to detect high-rate automated authentication attacks. Legitimate human-operated sessions do not normally generate authentication attempts at rates sufficient to trigger the deception threshold.
Once detected, the PLC generates a session number and redirects all subsequent Modbus operations associated with that session to temporary (fake) registers. The attacker’s IP address is also recorded. This approach preserves normal system operation while isolating malicious interactions, preventing resource exhaustion and unintended control actions.
To clarify the randomization mechanism, PMA generates challenge-response values using XOR operations between the received password fragments, hidden registers (D100, D101), and a dynamically generated random number (RN), as detailed in Algorithm 1. For legitimate users, consistency is ensured because the same RN and session context are maintained across the authentication sequence, leading to deterministic verification outcomes. In contrast, for suspicious or malicious sessions, RN values and responses are intentionally altered or decoupled from valid register states, resulting in inconsistent and misleading outputs that prevent attackers from inferring correct credentials.
3.3. Authentication and Lightweight Obfuscation
The authentication process, illustrated in
Figure 1, follows a lightweight XOR-based challenge–response mechanism. The client encodes a 32-bit password using a random number (RN) across three Modbus write operations. The PLC verifies correctness through XOR operations with hidden registers and consistency checks across the received values.
Upon successful authentication, the PLC generates a session number, encrypts it using the extracted RN, and returns it to the client. This session number is then used for lightweight obfuscation. For each session, the sequence number is incremented based on Modbus operations and XORed with register values before transmission. This prevents the reuse of observed data while maintaining low computational overhead. For attacker sessions, session numbers are still generated (see Algorithm 1) but only applied to fake data to preserve behavioral consistency.
This mechanism is not intended to replace cryptographic protocols such as TLS, but to provide a practical protection layer for resource-constrained PLCs. Passwords are never transmitted in plaintext, and all operations rely on simple instructions, such as XOR, MOV, and comparisons, ensuring deterministic execution with minimal overhead.
This design ensures that legitimate clients observe consistent authentication behavior, while attackers receive statistically unpredictable responses due to the controlled randomization process embedded in the PLC logic. However, PMA does not provide confidentiality, integrity, or formal authentication guarantees comparable to cryptographic protocols. Instead, its primary objective is to increase attacker uncertainty and operational cost in legacy industrial environments.
3.4. Threat Model and Security Assumptions
PMA assumes an adversary with network-level access to the PLC who can establish ModbusTCP connections, capture traffic, replay messages, and perform automated password-guessing attacks. The attacker is assumed not to possess physical access to the controller, firmware-level privileges, or knowledge of the PLC’s internal hidden registers and ladder-logic implementation.
PMA is specifically designed to mitigate online brute-force, session exhaustion, and unauthorized Modbus interaction attempts. It does not protect against firmware compromise, physical tampering, or attacks targeting vendor-specific programming interfaces that transmit credentials outside the PMA-controlled authentication workflow.
As with any deception-based mechanism, PMA assumes that the attackers cannot reliably distinguish deceptive responses from legitimate ones within a limited observation window. Long-term statistical analysis by highly adaptive adversaries may reduce the effectiveness of the deception strategy, which represents an inherent limitation of this class of defenses.
5. Results and Discussion
The Results section is divided into several subsections. Each subsection describes one of the evaluated scenarios and presents the corresponding experimental observations and analysis.
5.1. Default PLC Security Mechanism
Before implementing PMA, it is necessary to demonstrate that the default PLC security mechanism is insufficient. To do this, a password was configured on both PLCs using a configuration software from Delta named DCI-soft. This software is responsible for configuring security parameters such as PLC access passwords, IP addresses, and memory mapping. The password used in this section consists of four digits.
To program the PLC, Delta’s IDE, named ISP-Soft, was used. This IDE has the ability to program, compile, download and upload PLC codes, as well as monitor PLC outputs during execution. The PLCs were connected to the network using an Ethernet cable, which was also used to allow the IDE to communicate with the PLCs. ModbusTCP is the default protocol used to connect over Ethernet. A password was also configured in the PLC program to prevent unauthorized read/write operations. The program was then uploaded from the PLC after entering the required password. All of these operations were captured using Wireshark on the monitoring laptop. This means that passwords were configured for two critical functions. The first password protects the PLC configuration interface, which is responsible for IP address configuration and memory mapping. The second password protects the program management functions, including code upload and download operations.
To isolate the experiment, all devices on the network were powered off except for the Wireshark monitoring laptop, the configuration laptop, and the two PLCs, in order to reduce the size of the captured network traces. Finally, the captured dumps were analyzed using Python and the PyShark library.
The packet inspection process revealed that the PLC uses a vendor-specific ModbusTCP function (function code 100) for password authentication and configuration-related operations. Analysis of the packet payload showed that the password is transmitted in plaintext within the ModbusTCP frame. For example, the byte sequence “31 32 33 34” corresponds to the ASCII representation of the password “1234”. In our experiment, the plaintext password was observable in every authentication exchange captured by Wireshark. This observation indicates that authentication credentials are not encrypted during transmission, which exposes the system to potential interception and credential theft attacks.
Although configuration access and PLC reprogramming are typically performed only during installation or maintenance, which may explain the limited security mechanisms implemented for these operations, this behavior still introduces a potential vulnerability. For instance, an attacker could intentionally disrupt the network by overwhelming the DHCP server. If the PLC subsequently fails to obtain an IP address, a maintenance engineer may attempt to manually reconfigure the PLC’s network settings, which requires entering the configuration password. During this process, an attacker monitoring the network could capture the plaintext password and later use it to gain unauthorized access to the PLC.
Furthermore, even if a ladder logic program implements an additional protection mechanism requiring a password to access the PLC, the password must still be transmitted with each Modbus read or write operation. As a result, the authentication credentials repeatedly appear in the network traffic, making it possible for an attacker to capture the programmed password using a simple network sniffer.
These observations highlight a fundamental limitation of the default ModbusTCP authentication model and motivate the need for additional protection mechanisms such as the proposed PMA approach.
It is important to emphasize that the proposed PMA mechanism cannot protect these configuration-level authentication processes, as they are implemented at the firmware level and rely on vendor-specific Modbus functions. Addressing these vulnerabilities requires protocol-level security mechanisms such as Modbus/TCP Security or firmware modifications by the device manufacturer.
5.2. PLCs Stress Test Results
Before executing the brute-force attack, a stress test was performed (using the first laptop) to determine the maximum number of simultaneous client connections that the PLC could handle. The PyModbus library was used in combination with Python’s threading library to generate multiple concurrent Modbus requests. Different numbers of threads were tested to evaluate their impact on password-cracking time.
Figure 3 shows the time required to crack a 20-bit password using different numbers of threads. A 20-bit password space was selected because a 16-bit password can be cracked very quickly, while a 32-bit password would require several days under the same testing conditions.
The results show that the maximum number of effective concurrent threads supported by the PLC is approximately 16 simultaneous connections, which was confirmed for both PLC models. As illustrated in the figure, increasing the number of threads initially reduced the cracking time. However, beyond four concurrent threads, the total cracking time began to increase. The experimentally observed peak at four concurrent threads appears to be related to the internal scheduling and request-processing characteristics of the PLC communication stack. This behavior suggests that the PLC processes incoming requests using an internal queue when the maximum processing capacity is reached. Therefore, the device can efficiently process a limited number of simultaneous requests before queuing and contention effects dominate. Once the PLC becomes fully utilized, additional requests experience delays while waiting to be processed. This result indicates that there exists an optimal level of concurrency for brute-force attacks, beyond which additional parallelism leads to performance degradation rather than improvement.
Despite this queuing effect, the cracking time does not increase significantly when the maximum number of threads is reached. Similar results were observed for the SV3 family PLC. However, the cracking time was approximately 50% lower compared to the SE family, which is likely due to the faster execution capabilities of the SV3 PLC.
To further accelerate the brute-force process, the implemented attack performs two Modbus requests for each password attempt. The first request writes the candidate password to the PLC registers, and the second request reads the session or verification value to determine whether the authentication attempt was successful. To reduce the number of network transactions, Modbus function code 23 (0 x17) and read/write multiple registers can be used to perform both operations within a single request–response cycle. Using this approach reduced the cracking time by approximately 50% for both PLC models.
However, this function is not directly supported in the PyModbus library. Therefore, the function was manually implemented using the Scapy library to construct the required ModbusTCP packets. Experimental results showed that this approach worked successfully with the SE family PLC, but it did not function with the SV3 PLC, likely due to differences in the supported Modbus function set.
The brute-force attack was distributed across four Raspberry Pi devices, with four threads per device, resulting in a total of 16 concurrent connections.
Figure 4 illustrates the cracking time for different password sizes when using the optimized single-request approach on the SE family PLC. For the SV3 PLC, the cracking time remained approximately equal to the time required when using the modified two-request method. These findings highlight the importance of understanding PLC processing limits when designing both attack strategies and defensive mechanisms.
5.3. PLC Brute-Force DoS Attack
As shown in
Figure 3, the maximum number of simultaneous client connections supported by both tested Delta PLC families is 16 connections. However, it is important to examine how the PLC behaves when additional connection attempts are made beyond this limit. Different PLC vendors implement different strategies to handle excess connections. For example, some vendors terminate existing connections and accept new ones using a round-robin scheduling mechanism to serve incoming requests. Although this approach improves fairness among clients, it may also expose the system to Modbus-based denial-of-service (DoS) attacks, since attackers can continuously generate new connections to force the PLC to repeatedly close and reopen sessions.
In contrast, the Delta PLCs tested in this study reject additional connections once the maximum number of clients has been reached. However, an interesting behavior was observed: although the PLC refuses to establish new sessions, incoming Modbus requests from these extra clients can still be successfully transmitted over the network, but the PLC does not generate any responses. This behavior creates an asymmetric communication condition in which the PLC continues to receive and process incoming traffic at the network level but does not provide application-layer responses, leading to inefficient resource utilization.
To investigate the impact of this behavior, the four Raspberry Pi devices maintained persistent connections to the PLC using four threads each, resulting in 16 active connections, which saturates the PLC’s connection capacity. Meanwhile, the first laptop attempted to initiate additional connections and send Modbus requests.
In this test, the laptop repeatedly attempted to perform two operations: write multiple registers and read holding registers, using a randomly varying number of threads generated every 100 ms. The results show that the write requests were successfully transmitted, but the read operations did not receive any responses from the PLC. Packet inspection using PyShark confirmed that all Modbus requests originating from the laptop were captured in the network traffic, yet no corresponding responses from the PLC were observed. This confirms that the PLC does not fully reject excess traffic at the network level, but instead silently drops responses at the application layer.
This behavior increases the load on the PLC and consumes additional network bandwidth, as illustrated in
Figure 5. The figure shows that the number of successful Modbus operations decreased significantly under these conditions, dropping from approximately 7200 operations per second to about 3300 operations per second. This degradation demonstrates that the PLC communication stack becomes partially saturated, even though it does not explicitly accept additional client sessions. This result demonstrates that a brute-force attack targeting PLC authentication mechanisms can unintentionally evolve into a DoS condition, severely degrading the PLC’s ability to process legitimate Modbus requests.
These findings highlight a critical weakness in the PLC connection handling mechanism, where partial processing of unauthorized traffic can still lead to resource exhaustion and service degradation. This behavior suggests that effective protection mechanisms must not only limit connection establishment, but also control the processing of incoming requests beyond the connection threshold.
5.4. The Underlying Network Behavior
To study the underlaying LAN network behavior, four different traffic dumps were analyzed, each one containing four ModbusTCP sessions, where one additional Raspberry Pi device is introduced in each dump. These captures were analyzed to study the Modbus operation rate, bandwidth usage, and latency. All reported metrics represent averaged values over segmented traffic captures, with bandwidth expressed in Mbps, latency in milliseconds (ms), and throughput in operations per second.
Table 2 shows the traffic characteristics of the SE PLC. The dump files were divided into smaller segments of approximately 150 s, and the reported values corresponded to the average across these segments. This approach was used to reduce memory usage and improve processing efficiency during analysis. During the capture sessions, from one to four Raspberry Pi devices attempted to perform brute-force attacks against the PLCs. Each Raspberry Pi established four concurrent threads per PLC. The results show significant variation in network load depending on the number of concurrent connections. The generated traffic reached a maximum bandwidth of approximately 9.18 Mbps when the PLC was handling a smaller number of concurrent flows. As the number of flows increased, the average bandwidth slightly decreased due to communication overhead and resource sharing among multiple clients.
Table 3 presents the Modbus operations statistics. The results indicate that the PLC achieved a maximum processing rate of approximately 8566 Modbus operations per second. As the number of concurrent connections increased, the total throughput slightly decreased due to internal scheduling and processing limitations within the PLC communication stack.
Table 4 presents the flow-level statistics. The number of active flows increased during the experiments to simulate multiple clients accessing the PLC simultaneously. However, while the number of flows increased, the total number of packets slightly decreased, indicating reduced per-flow activity. Since each client creates a pair of TCP streams (request and response), the number of flows corresponds to approximately half the number of TCP connections. Therefore, the experiments represent up to 16 concurrent ModbusTCP client sessions communicating with the PLC.
Table 5 summarizes the observed response latency of the PLC during Modbus communication. As shown in
Table 5, the average response time increases progressively with the number of concurrent connections, indicating growing contention within the PLC communication stack.
The results demonstrate that the average response time increases as the number of active connections increases. This behavior indicates resource contention within the PLC communication stack as more clients attempt to access the device simultaneously.
The experimental results reveal a clear PLC saturation trend. When the number of concurrent connections increases, the PLC must distribute its processing capacity among all active sessions. As a result, the overall Modbus throughput decreases while the response latency increases. The maximum throughput observed during the experiments was approximately 8600 Modbus operations per second, representing the practical processing capacity of the evaluated PLC. Beyond this level, additional traffic would likely lead to communication delays and potential service degradation.
These findings demonstrate that the PLC communication stack can be saturated through relatively low-cost distributed traffic generation, highlighting a potential attack surface for ModbusTCP-based denial-of-service (DoS) attacks.
5.5. The Underlying Network Behavior of SV3 PLC
For the SV3 PLC, the computational capability was approximately twice that of the SE family, which directly impacts its performance characteristics. As a result, the number of processed packets and overall throughput approximately doubled, while the latency remained comparatively lower, as also observed during the password-cracking experiments, where the cracking time was reduced by approximately 50%. This confirms that the SV3 PLC can sustain a higher processing rate under identical attack conditions.
However, despite this improved computational performance, the maximum number of concurrent client connections remains limited to 16, which is the same as in the SE family. This limitation indicates that the bottleneck is not purely computational, but rather related to the internal design of the PLC communication stack or firmware constraints.
5.6. The DDoS Attack Impact
A final experiment was conducted to evaluate the impact of a massive semi-distributed denial-of-service (semi-DDoS) attack using four Raspberry Pi devices. In this scenario, 20 concurrent threads were initiated from each Raspberry Pi, resulting in a total of 80 connection attempts.
The attack was launched after 16 connections had already been successfully established from a laptop to the SE PLC, corresponding to the maximum number of supported concurrent client connections. One of these connections was maintained by the PLC development environment (IDE) to monitor and visualize the process of writing data to the PLC registers. All 80 attack threads attempted to establish connections simultaneously without any delay.
The results showed that although a complete denial of service was not achieved, the system experienced severe performance degradation. In particular, the process of writing data to the PLC registers became significantly slower, requiring several seconds to update values, indicating a substantial increase in communication latency and processing delay caused by excessive connection attempts.
The same experiment was conducted on the SV3 PLC. In this case, the number of attack threads was increased to 200 concurrent threads. Under these conditions, the IDE became unresponsive, and no updates were initially observed. However, after approximately 20 to 30 s, delayed updates were eventually processed.
These results demonstrate that even if a complete DoS condition is not immediately achieved, high-rate connection attempts can severely degrade system responsiveness, effectively leading to a functional denial of service from an operational perspective.
5.7. PMA Implementation
To implement PMA, one of the main design requirements was to ensure that the algorithm remains lightweight and compatible with resource-constrained PLC environments. In Delta PLCs, program memory is measured in steps, where each ladder logic rung requires between 3 and 15 steps, depending on its complexity. The PMA algorithm was implemented using 52 rungs, with an average of 7 steps per rung. This number can be further optimized.
The total memory capacity of the evaluated PLC families is approximately 16 k steps, which means that PMA occupies only 2.2% of the available memory. This demonstrates that PMA introduces minimal memory overhead, making it suitable for deployment in legacy industrial systems.
PMA was implemented on the Delta SE PLC, and brute-force attacks were launched from the four Raspberry Pi devices using different numbers of threads. The password-cracking process on each raspberry generated different passwords and random data patterns in the read/write operations. However, threads originating from the same client consistently obtained the same password, since PMA associates authentication behavior with the client IP address.
The system was evaluated over a period of 300 s during active attack conditions. This part of the experiment was repeated 10 times and the average value of these attempts is reported. During this time, only 73.5 Bytes/s of traffic was captured, corresponding to an average bandwidth of approximately 0.001 Mbps. Additionally, only 208 Modbus packets were observed, with a rate of 0.246 operations per second. This represents a drastic reduction in observable attack traffic compared to the baseline scenario, demonstrating the effectiveness of PMA in mitigating brute-force attempts.
It should be noted that the average response time (RTT) increased due to the additional computation and obfuscation introduced by PMA. The observed average RTT was approximately 3.6 ms. This increase represents a trade-off between security and performance, which remains acceptable within industrial communication constraints.
For configuration code download/upload passwords associated with ModbusTCP function codes 100 and 108, PMA cannot provide protection against brute-force attacks targeting these mechanisms. These functions require modifications at the PLC firmware level rather than application-layer mitigation.
To analyze the impact of attack rate on detection performance, we conceptually distinguished between high-rate and low-rate attacks. In high-rate scenarios, the detection threshold is exceeded within a short interval, resulting in near-immediate activation of deception. In contrast, low-rate password-guessing attacks may remain below the threshold for longer periods, increasing detection latency. Slow-rate brute-force attacks were not explicitly evaluated, since their operational impact is negligible and the time required to exhaust a 32-bit credential space is prohibitively large.
Without upgrading of the framework, the only viable protection mechanisms are external security solutions, such as firewalls configured to block unknown Modbus function codes. Additionally, IDS/IPS systems can be deployed to monitor and filter malicious LAN traffic in the case of system compromise. These findings highlight that protocol-level limitations cannot be fully mitigated through lightweight PLC-side defenses alone.
This also indicates that connecting PLCs directly to the Internet should be avoided. Instead, a secure intermediary server architecture, as proposed in [
22], should be used. Overall, the simplicity and lack of built-in security in ModbusTCP make it an attractive attack vector for network penetration in IIoT environments.
These results validate PMA as a practical and lightweight mitigation mechanism against brute-force attacks while also highlighting the need for complementary network-level defenses to address protocol-level vulnerabilities. Although the experiments were conducted on Delta PLCs, the identified vulnerabilities and attack vectors are inherent to the ModbusTCP protocol and are expected to affect other vendors implementing similar authentication mechanisms.
5.8. Adversarial Considerations
An advanced attacker may attempt to detect the presence of deception by systematically analyzing the behavior of the PLC across multiple interactions. For example, instead of relying on a single brute-force attempt, the attacker can perform multi-session probing, where the same credential guesses are repeated across different sessions and the resulting responses are compared with any inconsistency in authentication outcomes. This attack can be eliminated by saving only one wrong password for all heavy traffic that hit the system in a small window. In addition, an attacker can perform timing analysis by measuring response delays associated with authentication attempts and Modbus operations. If deceptive responses introduce different processing times compared to legitimate ones due to additional logic such as randomization, redirection to fake registers, or session management, these timing variations may be statistically distinguishable over a large number of observations. However, this attack is not valid in an IIoT environment since reading the data from different devices connected to PLCs may encounter different delay and latency values. Furthermore, replay and desynchronization attacks may be used to probe the consistency of the PMA mechanism. An attacker could capture valid communication sequences and replay them at different times or from different source addresses to observe whether the PLC produces consistent responses. If session-dependent values or obfuscation keys evolve in a predictable manner, the attacker may exploit this behavior to identify valid sessions or bypass certain aspects of the deception logic. This attack requires small enhancement of the algorithm code to add another decoy layer to create different session numbers.
Finally, long-term traffic analysis can reveal statistical differences between legitimate and deceptive interactions. Even if individual responses appear plausible, aggregated metrics such as response frequency, value distributions, register access patterns, or session lifetimes may deviate from normal PLC behavior. Over time, these discrepancies can provide sufficient evidence for an attacker to distinguish between real and deceptive system states.
While PMA incorporates randomized responses and session-based behavior to increase attacker uncertainty, it does not provide formal guarantees of indistinguishability under all adversarial models. Instead, its effectiveness relies on increasing the cost and complexity of attacks, particularly for automated brute-force tools, rather than achieving cryptographic security. Addressing these limitations would require integrating PMA with stronger security primitives or formally analyzing its resistance against adaptive adversaries.
6. Conclusions
This paper investigated the security limitations of PLC authentication mechanisms in ModbusTCP-based industrial environments and proposed a lightweight deception-based protection mechanism, called the PLC misleading algorithm (PMA). Experimental analysis conducted on two Delta PLC families demonstrated that authentication credentials are transmitted in plaintext during configuration and program management operations, allowing attackers to capture passwords through simple network sniffing techniques. In addition, stress testing revealed that the tested PLCs support a maximum of 16 simultaneous ModbusTCP sessions, making them vulnerable to brute-force attacks and resource-exhaustion scenarios. Furthermore, distributed brute-force attacks generated from multiple Raspberry Pi devices significantly degraded the PLC communication performance and increased response latency.
The proposed PMA mechanism was implemented directly inside the PLC ladder program with minimal resource consumption, occupying only 2.2% of the available PLC program memory. Unlike conventional protection techniques that simply block unauthorized access attempts, PMA introduces a deception-based strategy that misleads attackers by returning randomized yet controlled responses while maintaining consistent behavior for legitimate clients.
Experimental results showed that brute-force attacks were effectively neutralized, as attackers obtained inconsistent and unusable password values, while legitimate clients maintained stable and correct authentication responses. Furthermore, network traffic analysis indicated a drastic reduction in observable Modbus operations during attack conditions, demonstrating the effectiveness of PMA in limiting the capabilities of automated password-cracking tools.
These findings highlight that security mechanisms embedded directly within PLC logic can provide an effective first-line of defense without requiring modifications to existing industrial infrastructure. However, the study also revealed that certain vulnerabilities, particularly those associated with specific ModbusTCP function codes (e.g., configuration and firmware-related operations), cannot be mitigated solely through application-layer solutions and require firmware-level or network-level protections.
Overall, the results demonstrate that deception-based security mechanisms integrated at the device level can significantly improve the resilience of industrial control systems against brute-force and network-based attacks. This work contributes toward bridging the gap between lightweight PLC-level protections and the growing need for robust cybersecurity mechanisms in legacy industrial systems. While PMA effectively mitigates brute-force attacks targeting application-level authentication implemented within PLC logic, it does not address vulnerabilities in vendor-specific configuration and programming interfaces. These require complementary protocol-level or firmware-based security mechanisms.
Future work will focus on extending PMA to heterogeneous industrial environments involving multiple PLC vendors and communication protocols. In addition, integrating PMA with AI-based anomaly detection techniques will be investigated to enable adaptive and context-aware attack detection. Another promising direction is the deployment of PMA within distributed industrial architectures, where multiple PLCs cooperate to share threat intelligence and coordinate deception strategies. Furthermore, formal security analysis will be conducted to evaluate the robustness of PMA against adaptive adversaries and advanced traffic analysis techniques.