Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems

نویسندگان

چکیده

Abstract Industrial Control Systems are used in a wide variety of industrial facilities, including critical infrastructures, becoming the main target multiple security attacks. A malicious and successful attack against these infrastructures could cause serious economic environmental consequences, loss human lives. Static networks configurations topologies, which characterize Systems, represent an advantage for attackers, allowing them to scan vulnerable devices or services before carrying out attack. Identifying active is often first step many This paper presents proactive network reconnaissance defense mechanism based on temporal randomization IP addresses, MAC addresses port numbers. The obtained information distortion minimizes knowledge acquired by hindering any that relies addressing. attributes performed adaptive way, minimizing overhead introduced avoiding error latency communications. implementation as well tests have been carried laboratory with real equipment, demonstrating effectiveness presented solution.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GPS Network-Based Approach to Mitigate Residual Tropospheric Delay in Low Latitude Areas

A strong spatio-temporal variation of the wet component in the troposphere leaves us in a peculiar predicament. The residual tropospheric delay will remain in the measurements and therefore affect the estimation of related parameters. In the areas of hot and wet climate conditions, especially in the equatorial or low latitude regions, the strong tropospheric effect on GPS measurements is unques...

متن کامل

Run-Time Randomization to Mitigate Tampering

The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical ...

متن کامل

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Runtime and control-flow attacks (such as code injection or return-oriented programming) constitute one of the most severe threats to software programs. These attacks are prevalent and have been recently applied to smartphone applications as well, of which hundreds of thousands are downloaded by users every day. While a framework for control-flow integrity (CFI) enforcement, an approach to proh...

متن کامل

A New Method for Time-Delay Compensation in Control Systems

In this paper a new method is introduced and investigated for removing the destabilizing effects of time-delay parameter in control loops. The concept of the method is taken from the knowledge concerning the dynamic behaviour of irrational transfer functions (Ir-TF), which is discussed and investigated elswhere in frequency response domain and is explained briefly here. Ir-TFs, which are we...

متن کامل

Industrial Control System Cyber Attacks

This paper presents a set of attacks against SCADA control systems. The attacks are grouped into 4 classes; reconnaissance, response and measurement injection, command injection and denial of service. The 4 classes are defined and each attack is described in detail. The response and measurement injection and command injection classes are subdivided into sub-classes based on attack complexity. E...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Networks

سال: 2023

ISSN: ['1572-8196', '1022-0038']

DOI: https://doi.org/10.1007/s11276-022-03212-5