Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23142
|View full text |Cite
|
Sign up to set email alerts
|

Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems

Abstract: Industrial control system (ICS) networks used in critical infrastructures such as the power grid present a unique set of security challenges. The distributed networks are difficult to physically secure, legacy equipment can make cryptography and regular patches virtually impossible, and compromises can result in catastrophic physical damage. To address these concerns, this research proposes two device type fingerprinting methods designed to augment existing intrusion detection methods in the ICS environment. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
68
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 123 publications
(83 citation statements)
references
References 18 publications
0
68
0
Order By: Relevance
“…Techniques to track users can be divided into stateless and stateful approaches. Stateless approaches use specific attributes of the users' device to identify it [1,9,13,37,53] (often called "device fingerprinting"). In contrast, stateful approaches use the machine's state to identify users.…”
Section: Online Trackingmentioning
confidence: 99%
“…Techniques to track users can be divided into stateless and stateful approaches. Stateless approaches use specific attributes of the users' device to identify it [1,9,13,37,53] (often called "device fingerprinting"). In contrast, stateful approaches use the machine's state to identify users.…”
Section: Online Trackingmentioning
confidence: 99%
“…False positives in process 2 The developed model for process 2 created eight false positives. In Table 6, pairs (1, 2), (4,5), and (6, 7) have the same related attacks. Therefore, there were five independent false positives, and four of them were true.…”
Section: Analysis On False Positives (False Alarms)mentioning
confidence: 99%
“…However, IoT devices use numerous protocols and it would be nearly impossible to attempt such analysis on a per protocol and per device basis. Physical layer based device fingerprinting has received considerable attention [14], [15], [16], [17], [18] where the focus is on analyzing the physical aspects of devices to fingerprint them. All these works focused on general wireless devices and their applicability to IoT devices is an open question.…”
Section: State Of Current Researchmentioning
confidence: 99%