2019
DOI: 10.1109/jsyst.2019.2912308
|View full text |Cite
|
Sign up to set email alerts
|

Covert Channels-Based Stealth Attacks in Industry 4.0

Abstract: Industry 4.0 advent opens several cyber-threats scenarios originally designed for classic information technology, drawing the attention to serious risks for the modern industrial control networks. To cope with this problem, in this paper we address the security issues related to covert channels applied to industrial networks, identifying the new vulnerability points when information technologies converge with operational technologies such as edge computing infrastructures. Specifically, we define two signaling… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(12 citation statements)
references
References 23 publications
0
12
0
Order By: Relevance
“…On the other hand, as IIoT system activity is largely the result of automated processes, the traffic patterns tend to be fairly static and periodic, making it easier to perform accurate anomaly detection [180], [208]. Additionally, this predictability introduces the possibility for utilizing these patterns against the system through stealthy injection attacks [196], or to establish covert communication channels, as demonstrated in [172], and should be monitored against. In [176], Bernieri et al show that this predictability can be used against attackers by developing a honeypot for a water distribution system.…”
Section: G Security Monitoringmentioning
confidence: 99%
“…On the other hand, as IIoT system activity is largely the result of automated processes, the traffic patterns tend to be fairly static and periodic, making it easier to perform accurate anomaly detection [180], [208]. Additionally, this predictability introduces the possibility for utilizing these patterns against the system through stealthy injection attacks [196], or to establish covert communication channels, as demonstrated in [172], and should be monitored against. In [176], Bernieri et al show that this predictability can be used against attackers by developing a honeypot for a water distribution system.…”
Section: G Security Monitoringmentioning
confidence: 99%
“…Network vulnerabilities are directly related to attacks to devices and services [ 72 ]. According to the authors in [ 71 ], Industry 4.0 has created new scenarios of cyber-threats designed for classic it. To cope with this problem the authors address the security issues related to covert channels applied to industrial networks, identifying vulnerability points when classic it converges with operational technologies such as edge computing infrastructures.…”
Section: Review Of Selected Studiesmentioning
confidence: 99%
“…The authors presented network covert storage and network covert timing channels in the network and application layer of the BACnet protocol stack to show that protocol-level covert channels in BAS are feasible. In [25], Alcaraz et al addressed the security issues related to covert channels applied to industrial networks, identifying new vulnerability points when ITs converge with operational technologies such as edge computing infrastructures. Specifically, the authors defined two signalling strategies where they exploit the Modbus/transmission control protocol (TCP) as the target to set up a covert channel.…”
Section: Covert Channels In Cpssmentioning
confidence: 99%