Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Observing industrial control system attacks launched via Metasploit framework
Wallace N., Atkison T.  ACMSE 2013 (Proceedings of the 51st ACM Southeast Conference, Savannah, GA, Apr 4-6, 2013)1-4.2013.Type:Proceedings
Date Reviewed: Nov 20 2013

Wallace and Atkison, in this paper, model several attacks against programmable logic controllers and observe packet timing during the attacks. During a denial of service attack, the researchers record observations of legitimate and spoofed command and control packets directed toward a programmable logic controller. Attacks are crafted and launched via the open-source framework Metasploit. By comparing the time sequence information for legitimate and spoofed command and control packets, the authors identify a substantial time difference. They suggest that by defining a set of features based on the observations found in this paper, a sophisticated intrusion detection system can be designed for the industrial control system environment.

Overall, the paper exposes risks for industrial control systems running on programmable logic controllers. More research and development needs to be done in this area. I recommend this paper as a good bedtime read.

Reviewer:  Rajat Ravinder Review #: CR141746 (1401-0063)
Bookmark and Share
  Reviewer Selected
 
 
General (C.2.0 )
 
 
Reliability, Testing, And Fault-Tolerance (B.8.1 )
 
Would you recommend this review?
yes
no
Other reviews under "General": Date
Comparative evaluation of networks and protocols
Pooch U., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Aug 1 1985
Data communications, networks, and systems
Bartee T., Sams, Indianapolis, IN, 1985. Type: Book (9780672222351)
May 1 1987
Introduction to data communications and computer networks
Halsall F. (ed), Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1985. Type: Book (9789780201145472)
May 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy