Simple record

dc.rights.licenseAttribution-NonCommercial-ShareAlike 4.0 International*
dc.contributor.authorIturbe, Mikel
dc.contributor.authorGaritano, Iñaki
dc.contributor.authorEtxezarreta, Xabier
dc.contributor.authorZurutuza, Urko
dc.date.accessioned2024-03-22T14:27:58Z
dc.date.available2024-03-22T14:27:58Z
dc.date.issued2023
dc.identifier.isbn978-84-8438-865-4en
dc.identifier.otherhttps://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&ficha_no=174473en
dc.identifier.urihttps://hdl.handle.net/20.500.11984/6305
dc.description.abstractKontrol industrialerako sistemak askotariko instalazio industrialetan erabiltzen dira, azpiegitura kritikoetan barne, segurtasun-eraso anitzen helburu nagusi bihurtuz. Sare industrialen konfigurazio eta topologia estatikoek, abantaila bat suposatzen dute erasotzaileentzat, erasoa egin aurretik gailu edo zerbitzu ahulak eskaneatzeko aukera ematen baitiete. Artikulu honek IP helbide, MAC helbide eta portu zenbakien aleatorizazioan oinarritutako errekonozimendu erasoen aurkako defentsa proaktibo bat aurkezten du. Lortutako informazioaren distortsioak erasotzaileek lortutako ezagutza gutxitzen du, sareko helbidean oinarritzen den edozein eraso oztopatuz. Sareko identifikatzaileen aleatorizazioa modu moldagarrian egiten da, sarean sartutako gainkarga minimizatuz eta komunikazioetan edozein errore eta latentzia saihestuz. Inplementazioa eta probak benetako ekipamendu industrialarekin gauzatu dira, aurkeztutako soluzioaren eraginkortasuna frogatuz.eu
dc.description.abstractIndustrial Control Systems are used in a wide variety of industrial facilities, including critical infrastructures, becoming the main target of multiple security attacks. Static networks configurations and topologies, which characterize Industrial Control Systems, represent an advantage for attackers, allowing them to scan for vulnerable devices or services before carrying out the attack. This paper presents a proactive network reconnaissance defense mechanism based on the temporal randomization of network IP addresses, MAC addresses and port numbers. The obtained information distortion minimizes the knowledge acquired by the attackers, hindering any attack that relies on network addressing. The temporal randomization of network attributes is performed in an adaptive way, minimizing the overhead introduced in the network and avoiding any error and latency in communications. The implementation as well as the tests have been carried out in a laboratory with real industrial equipment, demonstrating the effectiveness of the presented solution.en
dc.language.isoeusen
dc.publisherUEUen
dc.rights© 2023 Egileaken
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/*
dc.subjectZibersegurtasun industrialaeu
dc.subjectSoftware bidez definitutako sareakeu
dc.subjectMoving Target Defenseen
dc.subjectErasoen defentsa proaktiboaeu
dc.subjectIndustrial cybersecurityen
dc.subjectSoftware defined networkingen
dc.subjectMoving Target Defenseen
dc.subjectProactive intrusion responseen
dc.titleLatentziarik gabeko sareko identifikatzaileen aleatorizazioa kontrol industrialerako sistemetan proaktiboki errekonozimendu erasoak mitigatzekoeu
dcterms.accessRightshttp://purl.org/coar/access_right/c_abf2en
dcterms.sourceV. Ikergazte. Nazioarteko ikerketa euskaraz. Kongresuko artikulu bilduma. Ingeniaritza eta Arkitekturaen
local.contributor.groupAnálisis de datos y ciberseguridades
local.description.peerreviewedtrueen
local.description.publicationfirstpage55en
local.description.publicationlastpage62en
local.identifier.doihttps://doi.org/10.26876/ikergazte.v.03.07en
local.source.detailsPp. 55-62. Donostia, 17-19 mayo 2023en
oaire.format.mimetypeapplication/pdfen
oaire.file$DSPACE\assetstoreen
oaire.resourceTypehttp://purl.org/coar/resource_type/c_c94fen
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85en
oaire.funderNameEusko Jaurlaritza = Gobierno Vasco
oaire.funderNameGipuzkoako Foru Aldundia = Diputación Foral de Gipuzkoa
oaire.funderIdentifierhttps://ror.org/00pz2fp31 http://data.crossref.org/fundingdata/funder/10.13039/501100003086
oaire.funderIdentifierhttps://ror.org/05bvkb649 http://data.crossref.org/fundingdata/funder/10.13039/501100019124
oaire.fundingStreamIkertalde Convocatoria 2022-2025
oaire.fundingStreamPrograma de apoyo a la Red guipuzcoana de Ciencia, Tecnología e Innovación
oaire.awardNumberIT1676-22
oaire.awardNumber2022-CIEN-000065-01
oaire.awardTitleGrupo de sistemas inteligentes para sistemas industriales
oaire.awardTitleGauza industrial ziberseguruak hodei ziberseguruetan (GAITZERDI)
oaire.awardURISin información
oaire.awardURISin información


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Simple record

Attribution-NonCommercial-ShareAlike 4.0 International
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-ShareAlike 4.0 International