Malware injection in operational technology networks

M Khadpe, P Binnar, F Kazi - 2020 11th International …, 2020 - ieeexplore.ieee.org
M Khadpe, P Binnar, F Kazi
2020 11th International Conference on Computing, Communication and …, 2020ieeexplore.ieee.org
Security Issues of Industrial Control System (ICS) increasing day by day because of this, it
gets more and more attention. Hackers finding different methods or approaches to finding
vulnerability of Operational Technology (OT) Networks. Some of the methods used by
Attacker are injection of malware and backdoor. Programmable logic controller (PLC) and
Supervisory Control and Data Acquisition (SCADA) both are important part of industry.
Usually, Industrial Control System network is completely isolated from external network, but …
Security Issues of Industrial Control System (ICS) increasing day by day because of this, it gets more and more attention. Hackers finding different methods or approaches to finding vulnerability of Operational Technology (OT) Networks. Some of the methods used by Attacker are injection of malware and backdoor. Programmable logic controller (PLC) and Supervisory Control and Data Acquisition (SCADA) both are important part of industry. Usually, Industrial Control System network is completely isolated from external network, but the administrative computer which is connected to the network are vulnerable, one of the reasons will be use of internet are increasing day by day. Stuxnet Attack is example of this type of vulnerability. The proposed work consist of are performing a Denial of service (DoS) attack on Allen Bradley PLC which is used to control Waste-Water Treatment Plant (WTP). To performing this attack we first, inject a malware into an administrative computer, which is connected to Waste-Water Treatment Plant network. The malware we inject into the network is capable of collecting all information of network which includes all IP address, its vendor information, MAC address etc. The data is stored into a text file which will downloaded from Victim Computer into Hacker computer by using Backdoor. And after finding target IP address, we will perform DoS attack. Also, this paper discussed about process of creating malware and backdoor as well as it includes analysis of network traffic before and after performing an attack.
ieeexplore.ieee.org
顯示最佳搜尋結果。 查看所有結果