Simple record

dc.rights.licenseAttribution 4.0 International*
dc.contributor.authorEtxezarreta, Xabier
dc.contributor.authorGaritano, Iñaki
dc.contributor.authorIturbe, Mikel
dc.contributor.authorZurutuza, Urko
dc.date.accessioned2023-01-12T12:19:05Z
dc.date.available2023-01-12T12:19:05Z
dc.date.issued2023
dc.identifier.issn1572-8196en
dc.identifier.otherhttps://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&ficha_no=170576en
dc.identifier.urihttps://hdl.handle.net/20.500.11984/5943
dc.description.abstractIndustrial Control Systems are used in a wide variety of industrial facilities, including critical infrastructures, becoming the main target of multiple security attacks. A malicious and successful attack against these infrastructures could cause serious economic and environmental consequences, including the loss of human lives. Static networks configurations and topologies, which characterize Industrial Control Systems, represent an advantage for attackers, allowing them to scan for vulnerable devices or services before carrying out the attack. Identifying active devices and services is often the first step for many attacks. This paper presents a proactive network reconnaissance defense mechanism based on the temporal randomization of network IP addresses, MAC addresses and port numbers. The obtained information distortion minimizes the knowledge acquired by the attackers, hindering any attack that relies on network addressing. The temporal randomization of network attributes is performed in an adaptive way, minimizing the overhead introduced in the network and avoiding any error and latency in communications. The implementation as well as the tests have been carried out in a laboratory with real industrial equipment, demonstrating the effectiveness of the presented solution.en
dc.description.sponsorshipGobierno Vasco-Eusko Jaurlaritzaes
dc.language.isoengen
dc.publisherSpringeren
dc.rights© 2023 The Authorsen
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectIndustrial control systemsen
dc.subjectMoving Target Defenseen
dc.subjectSoftware defined networkingen
dc.subjectIndustrial network securityen
dc.subjectProactive intrusion responseen
dc.titleLow delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systemsen
dcterms.accessRightshttp://purl.org/coar/access_right/c_abf2en
dcterms.sourceWireless Networksen
local.contributor.groupAnálisis de datos y ciberseguridades
local.description.peerreviewedtrueen
local.identifier.doihttps://doi.org/10.1007/s11276-022-03212-5en
local.relation.projectIDinfo:eu-repo/grantAgreement/GV/Ikertalde Convocatoria 2022-2025/IT1676-22/CAPV/Grupo de sistemas inteligentes para sistemas industriales/en
local.relation.projectIDinfo:eu-repo/grantAgreement/GV/Elkartek 2021/KK-2021-00091/CAPV/REal tiME control and embeddeD securitY/REMEDYen
local.rights.publicationfeeAPCen
local.rights.publicationfeeamount2290 EURen
oaire.format.mimetypeapplication/pdf
oaire.file$DSPACE\assetstore
oaire.resourceTypehttp://purl.org/coar/resource_type/c_6501en
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85en


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Simple record

Attribution 4.0 International
Except where otherwise noted, this item's license is described as Attribution 4.0 International