DC ElementWertSprache
dc.contributor.authorNawrocki, Marcin-
dc.contributor.authorSchmidt, Thomas C.-
dc.contributor.authorWählisch, Matthias-
dc.date.accessioned2020-09-02T15:38:43Z-
dc.date.available2020-09-02T15:38:43Z-
dc.date.issued2020-06-08-
dc.identifier.isbn978-1-7281-4973-8en_US
dc.identifier.isbn978-1-7281-4974-5en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/4583-
dc.description.abstractIndustrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure, but also the Internet ecosystem (e.g., DRDoS attacks). In this paper, we uncover unprotected inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. This traffic analysis is correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We provide an in-depth view on Internet-wide ICS communication. Our results can be used (1) to create precise filters for potentially harmful non-industrial ICS traffic, and (2) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks.en
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subject.ddc004: Informatiken_US
dc.titleUncovering Vulnerable Industrial Control Systems from the Internet Coreen
dc.typeinProceedingsen_US
dc.relation.conferenceIEEE/IFIP Network Operations and Management Symposium 2020en_US
dc.description.versionPeerRevieweden_US
local.contributorCorporate.editorInstitute of Electrical and Electronics Engineers-
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.doi10.1109/NOMS47738.2020.9110256-
tuhh.relation.ispartofseriesManagement in the age of softwarization and artificial intelligence : proceedings of IEEE/IFIP Network Operations and Management Symposium 2020 : 20-24 April 2020 / NOMS ; IEEE ComSoc - IEEE Communications Society, IFIP, IEEEen_US
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
item.creatorGNDNawrocki, Marcin-
item.creatorGNDSchmidt, Thomas C.-
item.creatorGNDWählisch, Matthias-
item.fulltextNo Fulltext-
item.creatorOrcidNawrocki, Marcin-
item.creatorOrcidSchmidt, Thomas C.-
item.creatorOrcidWählisch, Matthias-
item.seriesrefManagement in the age of softwarization and artificial intelligence : proceedings of IEEE/IFIP Network Operations and Management Symposium 2020 : 20-24 April 2020 / NOMS ; IEEE ComSoc - IEEE Communications Society, IFIP, IEEE-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.tuhhseriesidManagement in the age of softwarization and artificial intelligence : proceedings of IEEE/IFIP Network Operations and Management Symposium 2020 : 20-24 April 2020 / NOMS ; IEEE ComSoc - IEEE Communications Society, IFIP, IEEE-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.openairetypeinProceedings-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

68
checked on 27.12.2024

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.