Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis

@inproceedings{Fachkha2017InternetscalePO,
  title={Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis},
  author={Claude Fachkha and E. Bou-Harb and A. Keliris and N. Memon and M. Ahamad},
  booktitle={NDSS},
  year={2017}
}
Although the security of Cyber-Physical Systems (CPS) has been recently receiving significant attention from the research community, undoubtedly, there still exists a substantial lack of a comprehensive and a holistic understanding of attackers’ malicious strategies, aims and intentions. To this end, this paper uniquely exploits passive monitoring and analysis of a newly deployed network telescope IP address space in a first attempt ever to build broad notions of real CPS maliciousness… Expand
45 Citations
Theoretic derivations of scan detection operating on darknet traffic
  • 5
Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation
  • 8
Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective
  • 18
Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations
A Big Data Fusion to Profile CPS Security Threats Against Operational Technology
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors
  • 11
  • PDF
A first empirical look on internet-scale exploitations of IoT devices
  • 8
  • PDF
Who's Scanning Our Smart Grid? Empirical Study on Honeypot Data
  • 2
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 96 REFERENCES
Automating analysis of large-scale botnet probing events
  • 61
  • PDF
Towards Situational Awareness of Large-Scale Botnet Probing Events
  • 60
  • PDF
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
  • 59
Inferring Internet denial-of-service activity
  • 1,444
  • PDF
A Characterization of Cybersecurity Posture from Network Telescope Data
  • 24
  • PDF
Amplification Hell: Revisiting Network Protocols for DDoS Abuse
  • 288
  • PDF
Identifying and tracking suspicious activities through IP gray space analysis
  • 23
  • PDF
Fingerprinting Internet DNS Amplification DDoS Activities
  • 44
  • PDF
...
1
2
3
4
5
...