论文标题
通过IXP网络流量分析评估使用不安全的ICS协议的使用
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis
论文作者
论文摘要
现代工业控制系统(ICS)允许使用旨在与外部网络合作的工业协议通过Internet进行远程通信。为了了解与此实践相关的安全问题,先前的工作通常依赖于研究人员或肖丹等服务的主动扫描。尽管此类扫描可以确定公开开放的港口,但他们无法确定对不安全工业流量的合法使用。特别是,在网络地址翻译或防火墙中基于源的过滤阻止通过主动扫描检测,但不能确保在运输中未能操纵不安全的通信。在这项工作中,我们将基于SFLOW采样的本地Internet交换点(IXP)在本地Internet交换点(IXP)进行大规模流量分析进行比较。这种设置使我们能够确定ICS端点实际上通过Internet交换工业流量。此外,我们能够检测扫描活动以及系统交换了哪些其他类型的流量(即IT流量)。我们发现,Shodan仅列出了我们确定为交换工业流量的房东的不到2%,而Shodan确定的房东中只有7%实际上交换了工业流量。因此,Shodan不允许在Internet上实际使用不安全的工业协议以及ICS Communications中当前的安全实践。我们表明,有75.6%的IC主机仍然依靠未加密的通信而没有完整性的保护,而这些关键系统很容易受到恶意攻击。
Modern Industrial Control Systems (ICSs) allow remote communication through the Internet using industrial protocols that were not designed to work with external networks. To understand security issues related to this practice, prior work usually relies on active scans by researchers or services such as Shodan. While such scans can identify publicly open ports, they cannot identify legitimate use of insecure industrial traffic. In particular, source-based filtering in Network Address Translation or Firewalls prevent detection by active scanning, but do not ensure that insecure communication is not manipulated in transit. In this work, we compare Shodan-only analysis with large-scale traffic analysis at a local Internet Exchange Point (IXP), based on sFlow sampling. This setup allows us to identify ICS endpoints actually exchanging industrial traffic over the Internet. Besides, we are able to detect scanning activities and what other type of traffic is exchanged by the systems (i.e., IT traffic). We find that Shodan only listed less than 2% of hosts that we identified as exchanging industrial traffic, and only 7% of hosts identified by Shodan actually exchange industrial traffic. Therefore, Shodan do not allow to understand the actual use of insecure industrial protocols on the Internet and the current security practices in ICS communications. We show that 75.6% of ICS hosts still rely on unencrypted communications without integrity protection, leaving those critical systems vulnerable to malicious attacks.