Threat Analysis on Industrial Control System Based on Attacker's Behaviors using Honeypots

Arssy Hasyir Nursidiq, Charles Lim
{"title":"Threat Analysis on Industrial Control System Based on Attacker's Behaviors using Honeypots","authors":"Arssy Hasyir Nursidiq, Charles Lim","doi":"10.1109/ICARES56907.2022.9993566","DOIUrl":null,"url":null,"abstract":"Industrial Control System (ICS) is an information system used in the maintenance and management of critical infrastructures, which usually have distributed control systems, supervisory control, and data acquisition systems to control local processes. These systems may be used in the power distribution system, gas, water, transportation, and production. However, these systems lack authentication and confidentiality which causes the ICS easily compromised by the attacker. To understand the attacker interactions, behaviors, and type of attack that compromised the Industrial Control System (ICS) we used a honeypot to emulate the Industrial Control System (ICS) and collect the data from the attacker. The data collected from the honeypot is further analyzed and mapped to specific MITRE ATT&CK Tactic, Techniques, and Procedures. The mapping results provide the detailed attacker's behaviors and purpose when they try to compromise Industrial Control System (ICS) emulated in our honeypots.","PeriodicalId":252801,"journal":{"name":"2022 IEEE International Conference on Aerospace Electronics and Remote Sensing Technology (ICARES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Aerospace Electronics and Remote Sensing Technology (ICARES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICARES56907.2022.9993566","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Industrial Control System (ICS) is an information system used in the maintenance and management of critical infrastructures, which usually have distributed control systems, supervisory control, and data acquisition systems to control local processes. These systems may be used in the power distribution system, gas, water, transportation, and production. However, these systems lack authentication and confidentiality which causes the ICS easily compromised by the attacker. To understand the attacker interactions, behaviors, and type of attack that compromised the Industrial Control System (ICS) we used a honeypot to emulate the Industrial Control System (ICS) and collect the data from the attacker. The data collected from the honeypot is further analyzed and mapped to specific MITRE ATT&CK Tactic, Techniques, and Procedures. The mapping results provide the detailed attacker's behaviors and purpose when they try to compromise Industrial Control System (ICS) emulated in our honeypots.
基于蜜罐攻击者行为的工业控制系统威胁分析
工业控制系统(ICS)是一种用于关键基础设施维护和管理的信息系统,通常具有分布式控制系统、监控系统和数据采集系统来控制局部过程。这些系统可用于电力分配系统,燃气,水,运输和生产。然而,这些系统缺乏身份验证和机密性,使得ICS很容易被攻击者破坏。为了了解攻击者的交互、行为和破坏工业控制系统(ICS)的攻击类型,我们使用蜜罐模拟工业控制系统(ICS)并从攻击者那里收集数据。从蜜罐中收集的数据被进一步分析并映射到特定的MITRE攻击和攻击策略、技术和程序。映射结果提供了攻击者试图破坏蜜罐仿真工业控制系统(ICS)时的详细行为和目的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信