{"title":"互联网连接ICS/SCADA设备和服务的网络安全","authors":"Ísmail Erkek, E. Irmak","doi":"10.1109/ISCTURKEY53027.2021.9654285","DOIUrl":null,"url":null,"abstract":"The monitoring and control of automation systems in the most critical infrastructures are provided by industrial control systems (ICS). Because of the importance and criticality of these systems, they are likely to be exposed to some external and internal cyber threats. Especially if they have internet access, the cyber risks increase and these systems cause functional disorders. Within the scope of this study, search engines such as Shodan, Censys, Fofa, which are used to determine industrial control systems facing to internet access, have been examined and analyzed. Among them, an API for the Shodan search engine has been created. With the relevant API, industrial communication protocols and industrial control systems open to internet access have been extracted and usage statistics have been determined. In line with the information obtained, these communication protocols and systems have been analyzed and security recommendations have been made for industrial control systems open to internet access.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cyber Security of Internet Connected ICS/SCADA Devices and Services\",\"authors\":\"Ísmail Erkek, E. Irmak\",\"doi\":\"10.1109/ISCTURKEY53027.2021.9654285\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The monitoring and control of automation systems in the most critical infrastructures are provided by industrial control systems (ICS). Because of the importance and criticality of these systems, they are likely to be exposed to some external and internal cyber threats. Especially if they have internet access, the cyber risks increase and these systems cause functional disorders. Within the scope of this study, search engines such as Shodan, Censys, Fofa, which are used to determine industrial control systems facing to internet access, have been examined and analyzed. Among them, an API for the Shodan search engine has been created. With the relevant API, industrial communication protocols and industrial control systems open to internet access have been extracted and usage statistics have been determined. In line with the information obtained, these communication protocols and systems have been analyzed and security recommendations have been made for industrial control systems open to internet access.\",\"PeriodicalId\":383915,\"journal\":{\"name\":\"2021 International Conference on Information Security and Cryptology (ISCTURKEY)\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Information Security and Cryptology (ISCTURKEY)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCTURKEY53027.2021.9654285\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654285","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber Security of Internet Connected ICS/SCADA Devices and Services
The monitoring and control of automation systems in the most critical infrastructures are provided by industrial control systems (ICS). Because of the importance and criticality of these systems, they are likely to be exposed to some external and internal cyber threats. Especially if they have internet access, the cyber risks increase and these systems cause functional disorders. Within the scope of this study, search engines such as Shodan, Censys, Fofa, which are used to determine industrial control systems facing to internet access, have been examined and analyzed. Among them, an API for the Shodan search engine has been created. With the relevant API, industrial communication protocols and industrial control systems open to internet access have been extracted and usage statistics have been determined. In line with the information obtained, these communication protocols and systems have been analyzed and security recommendations have been made for industrial control systems open to internet access.