TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. On the significance of process comprehension for conducting targeted ICS attacks
 
Options

On the significance of process comprehension for conducting targeted ICS attacks

Publikationstyp
Conference Paper
Date Issued
2017-11-03
Sprache
English
Author(s)
Green, Benjamin  
Krotofil, Marina  orcid-logo
Abbasi, Ali  
Institut
Sicherheit in verteilten Anwendungen E-15  
TORE-URI
http://hdl.handle.net/11420/3950
Start Page
57
End Page
68
Citation
Workshop on Cyber-Physical Systems Security and PrivaCy - CPS-SPC: 57-68 (2017-11-03)
Contribution to Conference
Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC 2017  
Publisher DOI
10.1145/3140241.3140254
Scopus ID
2-s2.0-85037078177
The exploitation of Industrial Control Systems (ICSs) has been described as both easy and impossible, where is the truth? Post- Stuxnet works have included a plethora of ICS focused cyber security research activities, with topics covering device maturity, network protocols, and overall cyber security culture. We often hear the notion of ICSs being highly vulnerable due to a lack of inbuilt security mechanisms, considered a low hanging fruit to a variety of low skilled threat actors. While there is substantial evidence to support such a notion, when considering targeted attacks on ICS, it is hard to believe an attacker with limited resources, such as a script kiddie or hacktivist, using publicly accessible tools and exploits alone, would have adequate knowledge and resources to achieve targeted operational process manipulation, while simultaneously evade detection. Through use of a testbed environment, this paper provides two practical examples based on a Man-In-The-Middle scenario, demonstrating the types of information an attacker would need obtain, collate, and comprehend, in order to begin targeted process manipulation and detection avoidance. This allows for a clearer view of associated challenges, and illustrate why targeted ICS exploitation might not be possible for every malicious actor.
Subjects
ICS
MITM
OT
Reconnaissance
SCADA
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback