An Internet-wide view of ICS devices.

2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST)(2016)

引用 123|浏览184
暂无评分
摘要
Industrial control systems have become ubiquitous, enabling the remote, electronic control of physical equipment and sensors. Originally designed to operate on closed networks, the protocols used by these devices have no built-in security. However, despite this, an alarming number of systems are connected to the public Internet and an attacker who finds a device often can cause catastrophic damage to physical infrastructure. We consider two aspects of ICS security in this work: (1) what devices have been inadvertently exposed on the public Internet, and (2) who is searching for vulnerable systems. First, we implement five common SCADA protocols in ZMap and conduct a survey of the public IPv4 address space finding more than 60K publicly accessible systems. Second, we use a large network telescope and high-interaction honeypots to find and profile actors searching for devices. We hope that our findings can both motivate and inform future work on securing industrial control systems.
更多
查看译文
关键词
industrial control system,ICS device security,public Internet,catastrophic damage,physical infrastructure,SCADA protocol,ZMap,public IPv4 address space,large network telescope,high-interaction honeypot
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要