TY - CHAP
T1 - Misusing Sensory Channel to Attack Industrial Control Systems
AU - Rasapour, Farhad
AU - Mehrpouyan, Hoda
N1 - Publisher Copyright:
© 2018 Copyright held by the owner/author(s).
PY - 2018/1/1
Y1 - 2018/1/1
N2 - Industrial control systems (ICS) are used to control and manage critical infrastructures and protecting these complex system and their interfaces, which can be exploited by internal and external attackers, are a vital security task. Sensors, as an interface device, are used by ICS to collect information about the physical environment and should be guarded against cyber attacks. This paper investigates how sensors can be used as a communication channel by hackers to send a malicious command and control into the ICS. Further, we examine how abusing sensory channel would lead to a data pattern, which can be detected by a proper signature-based intrusion detection system (IDS).
AB - Industrial control systems (ICS) are used to control and manage critical infrastructures and protecting these complex system and their interfaces, which can be exploited by internal and external attackers, are a vital security task. Sensors, as an interface device, are used by ICS to collect information about the physical environment and should be guarded against cyber attacks. This paper investigates how sensors can be used as a communication channel by hackers to send a malicious command and control into the ICS. Further, we examine how abusing sensory channel would lead to a data pattern, which can be detected by a proper signature-based intrusion detection system (IDS).
KW - cyber-security
KW - industrial control system
KW - sensory channel misuse
UR - https://scholarworks.boisestate.edu/cs_facpubs/164
UR - https://doi.org/10.1145/3176258.3176947
UR - http://www.scopus.com/inward/record.url?scp=85052017687&partnerID=8YFLogxK
U2 - 10.1145/3176258.3176947
DO - 10.1145/3176258.3176947
M3 - Chapter
T3 - 2018-January
SP - 158
EP - 160
BT - CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy
T2 - 8th ACM Conference on Data and Application Security and Privacy, CODASPY 2018
Y2 - 19 March 2018 through 21 March 2018
ER -