Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data

被引:5
|
作者
You, Jianzhou [1 ,2 ]
Lv, Shichao [1 ,2 ]
Hao, Yichen [3 ]
Feng, Xuan [1 ,2 ]
Zhou, Ming [1 ,2 ]
Sun, Limin [1 ,2 ]
机构
[1] IIE CAS, Beijing Key Lab IoT Informat Secur Technol, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Chongqing Univ, Sch Big Data & Software Engn, Chongqing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
ICS honeypot; Automated attacks; Private protocol;
D O I
10.1007/978-3-030-41579-2_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial control system (ICS) devices with IP addresses are accessible on the Internet and become an essential part of critical infrastructures. The adoption of ICS devices also yields cyber-attacks targeted specific port based on proprietary industrial protocols. However, there is a lack of comprehensive understanding of these ICS threats in cyberspace. To this end, this paper uniquely exploits active interaction on ICS-related ports and analysis of long-term multi-port traffic in a first attempt ever to capture and comprehend ICS automated attacks based on private protocols. Specially, we first propose a minimal-interaction scheme for ICS honeypot(MirrorPot), which can listen on any port and respond automatically without understanding the protocol format. Then, we devise a pre-processing algorithm to extract requests payload and classify them from long-term honeypot-captured data. Finally, to better characterize the ICS attacks based on private industrial protocols, we propose a Markov state transition model for describing their attack complexity. Our experiments show that there are several unknown probing methods have not been observed by previous works. We concur that our work provides a solid first step towards capturing and comprehending real ICS attacks based on private protocols.
引用
收藏
页码:71 / 88
页数:18
相关论文
共 50 条
  • [1] Data Mining in Long-Term Honeypot Data
    Fraunholz, Daniel
    Zimmermann, Marc
    Hafner, Alexander
    Schotten, Hans D.
    [J]. 2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, : 649 - 656
  • [2] Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations
    Neshenko, Nataliia
    Husak, Martin
    Bou-Harb, Elias
    Celeda, Pavel
    Al-Mulla, Sameera
    Fachkha, Claude
    [J]. 2018 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2018,
  • [3] EternaBrain: Automated RNA design through move sets and strategies from an Internet-scale RNA videogame
    Koodli, Rohan, V
    Keep, Benjamin
    Coppess, Katherine R.
    Portela, Fernando
    Das, Rhiju
    [J]. PLOS COMPUTATIONAL BIOLOGY, 2019, 15 (06)
  • [4] AUTOMATED PRODUCTION THROUGH LONG-TERM STORAGE OF INJECTION MOLDINGS
    HARREIS, J
    [J]. KUNSTSTOFFE-GERMAN PLASTICS, 1983, 73 (02): : 71 - 72
  • [5] Long-term secure management of large scale Internet of Things applications
    Kim, Jun Young
    Hu, Wen
    Sarkar, Dilip
    Jha, Sanjay
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 138 : 15 - 26
  • [6] Viewing recycling's long-term sustainability through the prism of the internet?
    Mani, Zied
    Cova, Veronique
    [J]. RECHERCHE ET APPLICATIONS EN MARKETING-ENGLISH EDITION, 2014, 29 (03): : 57 - 74
  • [7] Characterizing Long-Term Pneumonectomy Outcomes Through Risk Factor and Survival Analyses
    Yesantharao, Pooja S.
    Davis, Trevor A.
    Yang, Stephen C.
    [J]. JOURNAL OF THE AMERICAN COLLEGE OF SURGEONS, 2018, 227 (04) : E85 - E85
  • [8] The Icatibant Outcome Survey: Characterizing Breakthrough Hereditary Angioedema Attacks In Patients Receiving Long-Term Prophylaxis
    Aberer, Werner
    Maurer, Marcus
    Bouillet, Laurence
    Perrin, Amandine
    Zanichelli, Andrea
    Caballero, Teresa
    Longhurst, Hilary
    [J]. JOURNAL OF ALLERGY AND CLINICAL IMMUNOLOGY, 2014, 133 (02) : AB35 - AB35
  • [9] Long-term data for understanding and simulating processes at the watershed scale
    Slaughter, CW
    [J]. RIVER BASIN MANAGEMENT, 2001, 5 : 337 - 345
  • [10] Automated eddy covariance data quality control for long-term measurements
    Sigut, L.
    Mauder, M.
    Sedlak, P.
    Pavelka, M.
    Spunda, V
    [J]. GLOBAL CHANGE: A COMPLEX CHALLENGE, 2015, : 58 - 61