DC FieldValueLanguage
dc.contributor.authorNawrocki, Marcin-
dc.contributor.authorSchmidt, Thomas C.-
dc.contributor.authorWählisch, Matthias-
dc.date.accessioned2022-01-31T10:13:14Z-
dc.date.available2022-01-31T10:13:14Z-
dc.date.issued2022-01-
dc.identifier.citationarticle number : e2158en_US
dc.identifier.issn1055-7148en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/12288-
dc.description.abstractIndustrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.g., by DRDoS attacks). In this paper, we measure and analyze inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. These traffic observations are correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We uncover mainly unprotected inter-domain ICS traffic and provide an in-depth view on Internet-wide ICS communication. Our results can be used (i) to create precise filters for potentially harmful non-industrial ICS traffic and (ii) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks. Additionally, we survey recent security extensions of ICS protocols, of which we find very little deployment. We estimate an upper bound of the deployment status for ICS security protocols in the Internet core.en_US
dc.description.sponsorshipBundesministerium für Bildung und Forschungen_US
dc.language.isoen_USen_US
dc.publisherWileyen_US
dc.relation.ispartofInternational journal of network managementen_US
dc.subject.ddc004: Informatiken_US
dc.titleIndustrial control protocols in the Internet core : Dismantling operational practicesen_US
dc.typeArticleen_US
tuhh.container.issue1en_US
tuhh.container.volume32en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.doi10.1002/nem.2158-
tuhh.type.opus(wissenschaftlicher) Artikel-
dc.rights.cchttps://creativecommons.org/licenses/by-nc-nd/4.0/en_US
dc.type.casraiJournal Article-
dc.type.diniarticle-
dc.type.driverarticle-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
tuhh.container.articlenumbere2158-
item.creatorGNDNawrocki, Marcin-
item.creatorGNDSchmidt, Thomas C.-
item.creatorGNDWählisch, Matthias-
item.fulltextNo Fulltext-
item.creatorOrcidNawrocki, Marcin-
item.creatorOrcidSchmidt, Thomas C.-
item.creatorOrcidWählisch, Matthias-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.languageiso639-1en_US-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.openairetypeArticle-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Appears in Collections:Publications without full text
Show simple item record

Page view(s)

78
checked on Dec 26, 2024

Google ScholarTM

Check

HAW Katalog

Check

Add Files to Item

Note about this record


This item is licensed under a Creative Commons License Creative Commons