Proceedings of the 9th Annual Cyber and Information Security Research Conference on - CISR '14 2014
DOI: 10.1145/2602087.2602109
|View full text |Cite
|
Sign up to set email alerts
|

Detection of SSH host spoofing in control systems through network telemetry analysis

Abstract: Modern networking architecture is designed with high scalability in mind. Different protocols can be encapsulated to support different systems. Machine identifiers (IP and MAC addresses) in network packets can be modified easily. This modification prevents servers from determining whether the connecting machines are allowed to communicate. Cryptographic functions have been used in protocols such as Secure Shell (SSH) to establish network node authenticity, but they can be circumvented by social engineering and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…For example, Carcano et al [30] proposed an IDS that monitors the network traffic based on state anomalies. Furthermore, Ponomarev et al [31] proposed hardware fingerprinting to detect SSH host spoofing, and the National Institute of Standards and Technology has proposed attack mitigation techniques based on firewalls to defend against man-in-the-middle attacks.…”
Section: Related Work and Possible Attacks On Scada Networkmentioning
confidence: 99%
“…For example, Carcano et al [30] proposed an IDS that monitors the network traffic based on state anomalies. Furthermore, Ponomarev et al [31] proposed hardware fingerprinting to detect SSH host spoofing, and the National Institute of Standards and Technology has proposed attack mitigation techniques based on firewalls to defend against man-in-the-middle attacks.…”
Section: Related Work and Possible Attacks On Scada Networkmentioning
confidence: 99%
“…Louisiana Tech University,Rail Road Ave,Wyly Tower 1620,Ruston,,LA, 71272 8. PERFORMING ORGANIZATION REPORT NUMBER CRL consists of several unique facilities that include virtualization, visualization, networking, micro-aerial vehicle and sensor networks (MAVSeN), and FPGA laboratories.…”
Section: Performing Organization Name(s) and Address(es)mentioning
confidence: 99%
“…Lack of such information reduces the ability to establish authenticity of the host transmitting the data [3]. Additionally, an attacker can perform data manipulations on the network to achieve penetration of target machines and spoof the authenticity of the transmitted packets [4].…”
Section: Introductionmentioning
confidence: 99%
“…In [8] a hardware fingerprinting method is proposed to establish data authenticity. Unlike business and residential networks, ICS networks maintain a steady packet flow, which allows the system to fingerprint different network nodes, based on the patterns of their communication.…”
Section: Introductionmentioning
confidence: 99%