Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis
@inproceedings{Fachkha2017InternetscalePO, title={Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis}, author={Claude Fachkha and E. Bou-Harb and A. Keliris and N. Memon and M. Ahamad}, booktitle={NDSS}, year={2017} }
Although the security of Cyber-Physical Systems (CPS) has been recently receiving significant attention from the research community, undoubtedly, there still exists a substantial lack of a comprehensive and a holistic understanding of attackers’ malicious strategies, aims and intentions. To this end, this paper uniquely exploits passive monitoring and analysis of a newly deployed network telescope IP address space in a first attempt ever to build broad notions of real CPS maliciousness… Expand
Supplemental Video
Figures, Tables, and Topics from this paper
45 Citations
Theoretic derivations of scan detection operating on darknet traffic
- Computer Science
- Comput. Commun.
- 2019
- 5
Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation
- Computer Science
- 2018 IEEE International Conference on Communications (ICC)
- 2018
- 8
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective
- Computer Science
- 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
- 2018
- 18
Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data
- Computer Science
- ICICS
- 2019
- 1
Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations
- Computer Science
- 2018 IEEE Globecom Workshops (GC Wkshps)
- 2018
A Big Data Fusion to Profile CPS Security Threats Against Operational Technology
- Computer Science
- 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
- 2020
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns
- Computer Science
- Digit. Investig.
- 2019
- 18
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors
- Computer Science
- ARES
- 2018
- 11
- PDF
A first empirical look on internet-scale exploitations of IoT devices
- Computer Science
- 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
- 2017
- 8
- PDF
Who's Scanning Our Smart Grid? Empirical Study on Honeypot Data
- Computer Science
- 2019 IEEE Global Communications Conference (GLOBECOM)
- 2019
- 2
- PDF
References
SHOWING 1-10 OF 96 REFERENCES
Towards Situational Awareness of Large-Scale Botnet Probing Events
- Computer Science
- IEEE Transactions on Information Forensics and Security
- 2011
- 60
- PDF
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
- Computer Science
- IEEE Communications Surveys & Tutorials
- 2016
- 59
A Characterization of Cybersecurity Posture from Network Telescope Data
- Computer Science, Mathematics
- INTRUST
- 2014
- 24
- PDF
Identifying and tracking suspicious activities through IP gray space analysis
- Geography, Computer Science
- MineNet '07
- 2007
- 23
- PDF
Fingerprinting Internet DNS Amplification DDoS Activities
- Computer Science
- 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)
- 2014
- 44
- PDF