dc.contributor.author
Nawrocki, Marcin
dc.contributor.author
Schmidt, Thomas C.
dc.contributor.author
Wählisch, Matthias
dc.date.accessioned
2022-01-11T11:40:04Z
dc.date.available
2022-01-11T11:40:04Z
dc.identifier.uri
https://refubium.fu-berlin.de/handle/fub188/31097
dc.identifier.uri
http://dx.doi.org/10.17169/refubium-30833
dc.description.abstract
Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.g., by DRDoS attacks). In this paper, we measure and analyze inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. These traffic observations are correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We uncover mainly unprotected inter-domain ICS traffic and provide an in-depth view on Internet-wide ICS communication. Our results can be used (i) to create precise filters for potentially harmful non-industrial ICS traffic and (ii) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks. Additionally, we survey recent security extensions of ICS protocols, of which we find very little deployment. We estimate an upper bound of the deployment status for ICS security protocols in the Internet core.
en
dc.format.extent
20 Seiten
dc.rights.uri
https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject
Industrial control systems
en
dc.subject
ICS security protocols
en
dc.subject.ddc
000 Informatik, Informationswissenschaft, allgemeine Werke::000 Informatik, Wissen, Systeme::004 Datenverarbeitung; Informatik
dc.title
Industrial control protocols in the Internet core: Dismantling operational practices
dc.type
Wissenschaftlicher Artikel
dcterms.bibliographicCitation.articlenumber
e2158
dcterms.bibliographicCitation.doi
10.1002/nem.2158
dcterms.bibliographicCitation.journaltitle
International Journal of Network Management
dcterms.bibliographicCitation.number
1
dcterms.bibliographicCitation.volume
32
dcterms.bibliographicCitation.url
https://doi.org/10.1002/nem.2158
refubium.affiliation
Mathematik und Informatik
refubium.affiliation.other
Institut für Informatik
refubium.funding
DEAL Wiley
refubium.note.author
Die Publikation wurde aus Open Access Publikationsgeldern der Freien Universität Berlin gefördert.
refubium.resourceType.isindependentpub
no
dcterms.accessRights.openaire
open access
dcterms.isPartOf.eissn
1099-1190