Ondrej Pospisil, Petr Blazek, R. Fujdiak, J. Misurec
{"title":"工业控制系统中的主动扫描","authors":"Ondrej Pospisil, Petr Blazek, R. Fujdiak, J. Misurec","doi":"10.1109/ISCSIC54682.2021.00049","DOIUrl":null,"url":null,"abstract":"Industrial control systems (ICS) networks have faced challenges in incident detection over the last few years. One of the issues harming ICS networks is the active scanning of such structures. Active scanning can be used in two different key scenarios: either by an attacker causing network damage or by the network owner to explore network hosts and visualize network architecture; in both cases, it can affect ICS network traffic. This paper aims to demonstrate active scanning using two tools (Nmap, Zmap) from the penetration tester's perspective. The penetration tester operation was described in the context of the impact on the failure or the delay of communication in the network. As a part of this work, an industrial testbed was created to analyse the impact of the scanning. While scanning with the Zmap tool, there was a complete loss of communication between the device and the testbed network. On the other hand, the Nmap tool displayed a delay and an occasional network outage. The article then described and visualized the delay and outage data. These results clearly show that it is not appropriate to use active scanners in industrial networks, as they can have a fatal impact on the entire network's communication.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Active Scanning in the Industrial Control Systems\",\"authors\":\"Ondrej Pospisil, Petr Blazek, R. Fujdiak, J. Misurec\",\"doi\":\"10.1109/ISCSIC54682.2021.00049\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Industrial control systems (ICS) networks have faced challenges in incident detection over the last few years. One of the issues harming ICS networks is the active scanning of such structures. Active scanning can be used in two different key scenarios: either by an attacker causing network damage or by the network owner to explore network hosts and visualize network architecture; in both cases, it can affect ICS network traffic. This paper aims to demonstrate active scanning using two tools (Nmap, Zmap) from the penetration tester's perspective. The penetration tester operation was described in the context of the impact on the failure or the delay of communication in the network. As a part of this work, an industrial testbed was created to analyse the impact of the scanning. While scanning with the Zmap tool, there was a complete loss of communication between the device and the testbed network. On the other hand, the Nmap tool displayed a delay and an occasional network outage. The article then described and visualized the delay and outage data. These results clearly show that it is not appropriate to use active scanners in industrial networks, as they can have a fatal impact on the entire network's communication.\",\"PeriodicalId\":431036,\"journal\":{\"name\":\"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCSIC54682.2021.00049\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCSIC54682.2021.00049","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Industrial control systems (ICS) networks have faced challenges in incident detection over the last few years. One of the issues harming ICS networks is the active scanning of such structures. Active scanning can be used in two different key scenarios: either by an attacker causing network damage or by the network owner to explore network hosts and visualize network architecture; in both cases, it can affect ICS network traffic. This paper aims to demonstrate active scanning using two tools (Nmap, Zmap) from the penetration tester's perspective. The penetration tester operation was described in the context of the impact on the failure or the delay of communication in the network. As a part of this work, an industrial testbed was created to analyse the impact of the scanning. While scanning with the Zmap tool, there was a complete loss of communication between the device and the testbed network. On the other hand, the Nmap tool displayed a delay and an occasional network outage. The article then described and visualized the delay and outage data. These results clearly show that it is not appropriate to use active scanners in industrial networks, as they can have a fatal impact on the entire network's communication.