Exploring Shodan From the Perspective of Industrial Control Systems

被引:18
作者
Chen, Yongle [1 ]
Lian, Xiaowei [1 ]
Yu, Dan [1 ]
Lv, Shichao [2 ,3 ]
Hao, Shaochen [1 ]
Ma, Yao [1 ]
机构
[1] Taiyuan Univ Technol, Coll Informat & Comp, Taiyuan 030024, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100089, Peoples R China
[3] IIE CAS, Beijing Key Lab IoT Informat Secur Technol, Beijing 100089, Peoples R China
关键词
Industrial control; Integrated circuits; Protocols; Search engines; Internet; Object recognition; Tools; Shodan; industrial control systems; honeypot; traffic recognition;
D O I
10.1109/ACCESS.2020.2988691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an essential component of the critical infrastructure, the Industrial Control System (ICS) is facing increasing cyber threats. The emergence of the Shodan search engine also magnified this threat. Since it can identify and index Internet-connected industrial control devices, the Shodan search engine has become a favorite toolkit for attackers and penetration testers. In this paper, we use honeypot technology to conduct a comprehensive exploring on Shodan search engine. We first deploy six distributed honeypot systems and collect three-month traffic data. For exploring Shodan, we design a hierarchical DFA-SVM recognition model to identify Shodan scans based on the function code and traffic feature, which is adapted to find the Shodan and Shodan-like scanners superior to the predominant method of reverse resolving IPs. Finally, we conduct an in-depth analysis for Shodan scans and evaluate the impact of Shodan on industrial control systems in terms of scanning time, scanning frequency, scanning port, region preferences, ICS protocol preferences and ICS protocol function code proportion. Accordingly, we provide some defensive measures to mitigate Shodan threat.
引用
收藏
页码:75359 / 75369
页数:11
相关论文
共 27 条
[1]  
Alalousi A., 2016, Int. J. Electr. Comput. Eng., V6, P778
[2]   SecureGuard: A Certificate Validation System in Public Key Infrastructure [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Cheng, Xiuzhen ;
Hu, Chunqiang ;
Yu, Jiguo .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) :5399-5408
[3]   Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? [J].
Alshammari, Riyad ;
Zincir-Heywood, A. Nur .
COMPUTER NETWORKS, 2011, 55 (06) :1326-1350
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], 2015, P USENIX WORKSHOP OF
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], 2013, SHODAN SCARIEST SEAR
[8]  
[Anonymous], [No title captured]
[9]  
[Anonymous], [No title captured]
[10]  
[Anonymous], [No title captured]