2016
DOI: 10.48550/arxiv.1608.07679
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Literature [6] proposes that using the TCP timestamp option in the TCP header to detect the clock deviation of a single device for single device fingerprinting. In [24], researchers use wavelet analysis to identify wireless access points based on frame arrival interval time increments, but this type of technology is not suitable for an industrial control device, as it relies on access points to route data to fingerprint readers. Radhakrishnan et al [25] introduce another time-based device fingerprinting technique called "GTID" to identify wireless devices and their types using the distribution of packet arrival intervals.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Literature [6] proposes that using the TCP timestamp option in the TCP header to detect the clock deviation of a single device for single device fingerprinting. In [24], researchers use wavelet analysis to identify wireless access points based on frame arrival interval time increments, but this type of technology is not suitable for an industrial control device, as it relies on access points to route data to fingerprint readers. Radhakrishnan et al [25] introduce another time-based device fingerprinting technique called "GTID" to identify wireless devices and their types using the distribution of packet arrival intervals.…”
Section: Related Workmentioning
confidence: 99%
“…Some device fingerprinting studies [11][12][13]28] focus on the characteristics of data packets, and the fingerprinting technology in this paper is similar to these studies. Jeon [24] provides a passive fingerprinting method for industrial control devices based on five characteristics of flow data, namely periodicity, communication persistence, device complexity gap, network service popularity, and segment size. Based on these characteristics, they calculate a ranking score for each device to distinguish between field devices and master servers.…”
Section: Related Workmentioning
confidence: 99%