2014
DOI: 10.1016/j.ijcip.2014.03.001
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
80
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 127 publications
(82 citation statements)
references
References 0 publications
1
80
0
1
Order By: Relevance
“…A performance of about 55 million TPM was measured for an average of 1 h and 9 min for 3.702 billion accessible IP addresses. This can be interpreted as a performance similar to the "one-probe" condition announced in ZMap as in Table 4 shown (Apoorva et al 2017;Bodenheim et al 2014;Vijayarajan et al 2016).…”
Section: Performance Of Collecting Device Informationmentioning
confidence: 63%
See 1 more Smart Citation
“…A performance of about 55 million TPM was measured for an average of 1 h and 9 min for 3.702 billion accessible IP addresses. This can be interpreted as a performance similar to the "one-probe" condition announced in ZMap as in Table 4 shown (Apoorva et al 2017;Bodenheim et al 2014;Vijayarajan et al 2016).…”
Section: Performance Of Collecting Device Informationmentioning
confidence: 63%
“…The engine can also search for the existence of vulnerabilities such as Heartbleed and Poodle by collecting information about whether or not to use SSL cryptographic algorithm as well as the version information. Meanwhile, Durumeric developed Censys, a search engine that can quickly scan devices connected to the Internet (Bodenheim et al 2014). Censys was developed based on ZMap and ZGrab, which are open source.…”
Section: Scan Technology For Internet Devicesmentioning
confidence: 99%
“…The existing literature highlights that IP scanners are being used to gain information about SCADA systems [9], the types of devices that are potentially vulnerable when scanned [10], and the consequences of performing scans on live systems [7].…”
Section: Introductionmentioning
confidence: 99%
“…In order to scan the industrial control system exposed to the global public network quickly and accurate, discovering and managing industrial control system to identify the scope of impact of vulnerability accurately when the vulnerability break out [4,5,6]. We proposed an industrial control network scanning tools based on stateless connection: ICSMap.…”
Section: Introductionmentioning
confidence: 99%