An Internet-wide view of ICS devices

Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael Bailey

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Industrial control systems have become ubiquitous, enabling the remote, electronic control of physical equipment and sensors. Originally designed to operate on closed networks, the protocols used by these devices have no built-in security. However, despite this, an alarming number of systems are connected to the public Internet and an attacker who finds a device often can cause catastrophic damage to physical infrastructure. We consider two aspects of ICS security in this work: (1) what devices have been inadvertently exposed on the public Internet, and (2) who is searching for vulnerable systems. First, we implement five common SCADA protocols in ZMap and conduct a survey of the public IPv4 address space finding more than 60K publicly accessible systems. Second, we use a large network telescope and high-interaction honeypots to find and profile actors searching for devices. We hope that our findings can both motivate and inform future work on securing industrial control systems.

Original languageEnglish (US)
Title of host publication2016 14th Annual Conference on Privacy, Security and Trust, PST 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages96-103
Number of pages8
ISBN (Electronic)9781509043798
DOIs
StatePublished - 2016
Event14th Annual Conference on Privacy, Security and Trust, PST 2016 - Auckland, New Zealand
Duration: Dec 12 2016Dec 14 2016

Publication series

Name2016 14th Annual Conference on Privacy, Security and Trust, PST 2016

Other

Other14th Annual Conference on Privacy, Security and Trust, PST 2016
CountryNew Zealand
CityAuckland
Period12/12/1612/14/16

ASJC Scopus subject areas

  • Safety Research
  • Computer Networks and Communications
  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'An Internet-wide view of ICS devices'. Together they form a unique fingerprint.

Cite this