首页> 外文会议>International Topical Meeting on Nuclear Plant Instrumentation, Controls, and Human Machine Interface Technology >Using Cyber Vulnerability Testing Techniques to Expose Undocumented Security Vulnerabilities in DCS and SCADA Equipment
【24h】

Using Cyber Vulnerability Testing Techniques to Expose Undocumented Security Vulnerabilities in DCS and SCADA Equipment

机译:使用网络漏洞测试技术在DCS和SCADA设备中公开无证的安全漏洞

获取原文

摘要

This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (3rd Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology. i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering/Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems.
机译:本次会议通过提供典型的DCS(分布式控制系统)和SCADA(监控和数据采集)架构的概述,并公开供应商从未承认的网络安全漏洞,而是通过全面的网络测试过程找到。完整的评估过程涉及测试SCADA或DCS环境的所有层数和组件,从周边防火墙一直到控制过程的最终设备,包括在进行实时控制的漏洞评估时要查找的内容系统。讨论以下系统:1。周边(从公司IT的隔离或其他非关键网络)2。远程访问(第三方访问SCADA或DCS网络)3.网络架构(交换机,路由器,防火墙,访问控制,网络设计)4。网络流量分析(网络上运行的内容)5。主机操作系统硬化6.应用程序(如何与其他应用程序和最终设备通信)7.终端设备测试(PLC,RTU,DCS控制器,智能发射器) 一种。系统发现b。功能发现c。攻击方法。一世。 DOS测试(设备失败的点)II。格式错误的数据包测试(可以导致设备故障的数据包)III。会议劫持(操作员可以做的事情)IV。数据包注入(代码并注明您自己的SCADA命令)v。协议开发(协议逆向工程/模糊)本文将提供从控制系统硬件,软件和系统进行网络安全测试的五年内编译的信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号