2013
DOI: 10.1007/978-3-319-03964-0_14
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility of Device Fingerprinting in Industrial Control Systems

Abstract: As Industrial Control Systems (ICS) and standard IT networks are becoming one heterogeneous entity, there has been an increasing effort in adjusting common security tools and methodologies to fit the industrial environment. Fingerprinting of industrial devices is still an unexplored research field. In this paper we provide an overview of standard device fingerprinting techniques and an assessment on the application feasibility in ICS infrastructures. We identify challenges that fingerprinting has to face and m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
15
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(17 citation statements)
references
References 24 publications
2
15
0
Order By: Relevance
“…With regard to fingerprinting information technology systems, Caselli et al [5] observe that the most widely adopted fingerprinting technique uses a 67-bit signature from TCP/IP protocol headers to identify an operating system on a machine in a standard network. Caselli and colleagues also describe the challenges involved in fingerprinting industrial control devices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…With regard to fingerprinting information technology systems, Caselli et al [5] observe that the most widely adopted fingerprinting technique uses a 67-bit signature from TCP/IP protocol headers to identify an operating system on a machine in a standard network. Caselli and colleagues also describe the challenges involved in fingerprinting industrial control devices.…”
Section: Related Workmentioning
confidence: 99%
“…Caselli et al [5] have noted that industrial control system characteristics make device fingerprinting more challenging compared with conventional information technology networks due to device heterogeneity, proprietary protocols, device computational power and long-standing TCP sessions. On the other hand, from the system perspective, industrial control systems -unlike conventional information technology networks -tend to have stable and persistent control flow communications patterns, including characteristics such as long lifecycles, static topologies, periodic behavior and a limited number of applications and protocols [1,16].…”
Section: Introductionmentioning
confidence: 99%
“…Guideword Deviation / Potential threat add a user adds a valve to the group Valve modify a user modifies the name of a valve (topology) 1 delete a user deletes a valve from the group add no Tanks modify a user modifies the capacity of tank (e.g., the presumed capacity of tank is increased by double) (operational parameters) 2 delete no add a user adds action type to the allowed actions (e.g., a user adds "inserting setpoint" and/or "changing pump status" to the list of allowed operator actions on a pump) Pumps modify no (access settings) 3 delete a user deletes action type from allowed actions (e.g., a user deletes "inserting setpoint" and/or "changing pump status" from operator actions on a pump) example, depending on the context (i.e., the specific software control implementation), some combinations of keywords and guidewords do not apply (e.g., acidity parameters cannot be deleted) or are not considered as severe (e.g., add tank). To this end, the focus group selected 35 user actions that represent a potential threat.…”
Section: Keywordmentioning
confidence: 99%
“…While both plants use equipment from the same (well-known) vendor, they deploy different software versions. 2 We have access to (i) 3 day long packet trace from plant A and (ii) 14 day long packet trace from plant B. Both traces contain the complete network traffic captured from the mirroring port of the switches that connect the different PLCs and the ICS servers.…”
Section: Environments and Data Setsmentioning
confidence: 99%
See 1 more Smart Citation