The incautious connection to the Internet of any unprotected Industrial Control System (ICS) is enormously risky, especially if those belong to critical infrastructures like the national power grid. The goals of this work are to revise a methodology for estimating the exposure of the ICSes over the Internet, which we apply to the Italian network, and to raise awareness about this subject. In order to estimate such an exposure, our approach followed different phases. First, we studied the working principles and the technology of industrial control systems. Then, a list of the main ICS protocols was drawn up. Finally, we investigated the exposure of each ICS protocol over the Italian IP address space by querying Shodan’s database for protocol-specific features (e.g., TCP/UDP ports, headers). Besides, we investigated the exposure of IT technologies commonly used for monitoring and managing ICSes (e.g., web HMI and remote desktops). The findings we collected show that a vast amount of ICSes, belonging to different kinds of infrastructures, are currently exposed over the Internet and that anyone can freely interact with those. Moreover, this work shows how easily anyone could employ common public tools to search for ICSes exposed over the Internet.

A Online Discoverability of Exposed Industrial Control Systems / D'Amore, Fabrizio; Forte, Paolo; Pisano, Antonio. - 3094:(2021). (Intervento presentato al convegno International Workshop on Advanced in Information Security Management and Applications (AISMA 2021) tenutosi a Stavropol; Russia).

A Online Discoverability of Exposed Industrial Control Systems

Fabrizio d’Amore
Co-primo
Membro del Collaboration Group
;
Paolo Forte
Co-primo
Membro del Collaboration Group
;
2021

Abstract

The incautious connection to the Internet of any unprotected Industrial Control System (ICS) is enormously risky, especially if those belong to critical infrastructures like the national power grid. The goals of this work are to revise a methodology for estimating the exposure of the ICSes over the Internet, which we apply to the Italian network, and to raise awareness about this subject. In order to estimate such an exposure, our approach followed different phases. First, we studied the working principles and the technology of industrial control systems. Then, a list of the main ICS protocols was drawn up. Finally, we investigated the exposure of each ICS protocol over the Italian IP address space by querying Shodan’s database for protocol-specific features (e.g., TCP/UDP ports, headers). Besides, we investigated the exposure of IT technologies commonly used for monitoring and managing ICSes (e.g., web HMI and remote desktops). The findings we collected show that a vast amount of ICSes, belonging to different kinds of infrastructures, are currently exposed over the Internet and that anyone can freely interact with those. Moreover, this work shows how easily anyone could employ common public tools to search for ICSes exposed over the Internet.
2021
International Workshop on Advanced in Information Security Management and Applications (AISMA 2021)
ICS; SCADA; HMI; Shodan; Cybersecurity
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
A Online Discoverability of Exposed Industrial Control Systems / D'Amore, Fabrizio; Forte, Paolo; Pisano, Antonio. - 3094:(2021). (Intervento presentato al convegno International Workshop on Advanced in Information Security Management and Applications (AISMA 2021) tenutosi a Stavropol; Russia).
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1652430
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact