2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE) 2016
DOI: 10.1109/sice.2016.7749239
|View full text |Cite
|
Sign up to set email alerts
|

Security threats of Internet-reachable ICS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The latter could therefore become a critical element, since the unavailability of just a single PLC would impede the operators from monitoring or controlling large portions of the water system. On the other hand, increasing the number of PLCs would require to deploy multiple local area networks-as well as network routing to interconnect them-thereby exposing the cyber-physical systems to other vulnerabilities (Abe et al 2016). Finding a reasonable trade-off between costs, vulnerabilities, and operational flexibility is thus a complex task that could be tackled with DHALSIM.…”
Section: Discussionmentioning
confidence: 99%
“…The latter could therefore become a critical element, since the unavailability of just a single PLC would impede the operators from monitoring or controlling large portions of the water system. On the other hand, increasing the number of PLCs would require to deploy multiple local area networks-as well as network routing to interconnect them-thereby exposing the cyber-physical systems to other vulnerabilities (Abe et al 2016). Finding a reasonable trade-off between costs, vulnerabilities, and operational flexibility is thus a complex task that could be tackled with DHALSIM.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, it is worth mentioning that there is a specific area on Shodan's webpage for detecting multiple ICSs [67]. In fact, different researchers have previously warned on the existence of numerous ICSs, Supervisory Control and Data Acquisition (SCADA) systems and PLCs exposed on the Internet and that can be easily discovered with Shodan [68][69][70][71][72]. In addition, Shodan has been used for detecting CPSs [73] or smart healthcare devices [74], thus demonstrating that little effort is required to detect critical IIoT devices and exposed Industry 4.0 services.…”
Section: Iiot and Industry 40 Cybersecurity Toolsmentioning
confidence: 99%
“…The basic functions of ICS involve: sensor measurements, hardware control for actuators (breakers, switches and monitors), humanmachine interfacing and remote diagnostics and maintenance utilities (Cárdenas et al, 2008;Nicholson et al, 2012). The modern ICS and it's development trends enable great business and operational profitability, an inevitable array of security susceptibilities are as well introduced, which threaten the functional reliability of operations in the industrial domain (Abe et al, 2016). Over the past years, records continue to show an alarming increase in cyber threats and attacks against ICSs globally.…”
Section: Introductionmentioning
confidence: 99%