Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation

04/08/2019
by   Matthias Niedermaier, et al.
0

Owing to a growing number of attacks, the assessment of Industrial Control Systems (ICSs) has gained in importance. An integral part of an assessment is the creation of a detailed inventory of all connected devices, enabling vulnerability evaluations. For this purpose, scans of networks are crucial. Active scanning, which generates irregular traffic, is a method to get an overview of connected and active devices. Since such additional traffic may lead to an unexpected behavior of devices, active scanning methods should be avoided in critical infrastructure networks. In such cases, passive network monitoring offers an alternative, which is often used in conjunction with complex deep-packet inspection techniques. There are very few publications on lightweight passive scanning methodologies for industrial networks. In this paper, we propose a lightweight passive network monitoring technique using an efficient Media Access Control (MAC) address-based identification of industrial devices. Based on an incomplete set of known MAC address to device associations, the presented method can guess correct device and vendor information. Proving the feasibility of the method, an implementation is also introduced and evaluated regarding its efficiency. The feasibility of predicting a specific device/vendor combination is demonstrated by having similar devices in the database. In our ICSi testbed, we reached a host discovery rate of 100 outperforming the results of existing tools.

READ FULL TEXT

page 1

page 2

page 7

research
02/03/2022

A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools

Asset scanning and discovery is the first and foremost step for organiza...
research
10/16/2019

Network Scanning and Mapping for IIoT Edge Node Device Security

The amount of connected devices in the industrial environment is growing...
research
06/28/2021

Automatically Determining a Network Reconnaissance Scope Using Passive Scanning Techniques

The starting point of securing a network is having a concise overview of...
research
04/06/2022

IoT-Scan: Network Reconnaissance for the Internet of Things

Network reconnaissance is a core networking and security procedure aimed...
research
07/17/2020

Analysis of Industrial Device Architectures for Real-Time Operations under Denial of Service Attacks

More and more industrial devices are connected to IP-based networks, as ...
research
11/03/2019

Calcium Vulnerability Scanner (CVS): A Deeper Look

Traditional vulnerability scanning methods are time-consuming and indeci...
research
10/14/2019

Using AI/ML to gain situational understanding from passive network observations

The data available in the network traffic fromany Government building co...

Please sign up or login with your details

Forgot password? Click here to reset