کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
4955619 1364633 2017 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
DFRWS 2017 USA - Proceedings of the Seventeenth Annual DFRWS USASCADA network forensics of the PCCC protocol
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
DFRWS 2017 USA - Proceedings of the Seventeenth Annual DFRWS USASCADA network forensics of the PCCC protocol
چکیده انگلیسی

Most SCADA devices have few built-in self-defence mechanisms, and tend to implicitly trust communications received over the network. Therefore, monitoring and forensic analysis of network traffic is a critical prerequisite for building an effective defense around SCADA units. In this work, we provide a comprehensive forensic analysis of network traffic generated by the PCCC(Programmable Controller Communication Commands) protocol and present a prototype tool capable of extracting both updates to programmable logic and crucial configuration information. The results of our analysis show that more than 30 files are transferred to/from the PLC when downloading/uploading a ladder logic program using RSLogix programming software including configuration and data files. Interestingly, when RSLogix compiles a ladder-logic program, it does not create any low-level representation of a ladder-logic file. However, the low-level ladder logic is present and can be extracted from the network traffic log using our prototype tool. The tool extracts SMTP configuration from the network log and parses it to obtain email addresses, username and password. The network log contains password in plain text.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Digital Investigation - Volume 22, Supplement, August 2017, Pages S57-S65
نویسندگان
, , ,