Modern Industrial Control Systems (ICSs) allow remote communication through the Internet using industrial protocols that were not designed to work with external networks. To understand security issues related to this practice, prior work usually relies on active scans by researchers or services such as Shodan. While such scans can identify publicly open ports, they cannot identify legitimate use of insecure industrial traffic. In particular, source-based filtering in Network Address Translation or Firewalls prevent detection by active scanning, but do not ensure that insecure communication is not manipulated in transit. In this work, we compare Shodan-only analysis with large-scale traffic analysis at a local Internet Exchange Point (IXP), based on sFlow sampling. This setup allows us to identify ICS endpoints actually exchanging industrial traffic over the Internet. Besides, we are able to detect scanning activities and what other type of traffic is exchanged by the systems (i.e., IT traffic). We find that Shodan only listed less than 2% of hosts that we identified as exchanging industrial traffic, and only 7% of hosts identified by Shodan actually exchange industrial traffic. Therefore, Shodan do not allow to understand the actual use of insecure industrial protocols on the Internet and the current security practices in ICS communications. We show that 75.6% of ICS hosts still rely on unencrypted communications without integrity protection, leaving those critical systems vulnerable to malicious attacks.
翻译:现代工业控制系统(ICS)允许使用并非设计与外部网络合作的工业协议通过互联网进行远程通信。 为了理解与这一做法有关的安全问题, 先前的工作通常依赖于研究人员或Shodan等服务机构的积极扫描。 虽然这种扫描可以识别公开开放的港口, 但无法识别不安全的工业交通的合理用途。 特别是, 网络地址翻译或防火墙中基于源的过滤无法通过主动扫描检测, 但并不能确保不安全的通信在中转中不被操纵。 在这项工作中, 我们比较了Shodan专用分析与本地互联网交换点(IXP)的大规模交通分析。 因此, Shodan无法理解ICS在互联网上实际交换工业交通的终点点( IXP ) 。 此外, 我们无法检测扫描活动以及系统( IT 交通) 所交换的其他类型的交通。 我们发现Shodan仅列出不到2%的东道国在交换工业交通时受到操纵, 并且只有7%的东道国在Shodan实际交换了工业交通。 因此, Shordan不允许我们在互联网上实际使用不可靠的工业安全性协议, 并使用这些安全性协议。