6,506 research outputs found

    Uncovering Vulnerable Industrial Control Systems from the Internet Core

    Full text link
    Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.g., DRDoS~attacks). In this paper, we uncover unprotected inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. This traffic analysis is correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We provide an in-depth view on Internet-wide ICS communication. Our results can be used i) to create precise filters for potentially harmful non-industrial ICS traffic, and ii) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks

    Aeronautical Engineering: A special bibliography with indexes, supplement 51

    Get PDF
    This bibliography lists 206 reports, articles, and other documents introduced into the NASA Scientific and Technical Information System in November 1974

    Novel Approach using Robust Routing Protocol in Underwater Acoustic Wireless Sensor Network with Network Simulator 2: A Review

    Get PDF
    In recent year wireless sensor network has been an emerging technology and promising technology in unveiling the riddle of the marine life and other underwater applications. As it is a permutation of computation, sensing and communication. In the 70% of the earth a huge amount of unexploited resources lies covered by oceans. To coordinate interact and share information among themselves to carry out sensing and monitoring function underwater sensor network consists number of various sensors and autonomous underwater vehicles deployed underwater. The two most fundamental problems in underwater sensor network are sensing coverage and network connectivity. The coverage problem reflects how well a sensor network is tracked or monitored by sensors. An underwater wireless sensor networks is the emerging field that is having the challenges in each field such as the deployment of nodes, routing, floating movement of sensors etc. This paper is concerned about the underwater acoustic wireless sensor network of routing protocol applications and UW-ASNs deployments for monitoring and control of underwater domains

    IEEE 802.11 i Security and Vulnerabilities

    Get PDF
    Despite using a variety of comprehensive preventive security measures, the Robust Secure Networks (RSNs) remain vulnerable to a number of attacks. Failure of preventive measures to address all RSN vulnerabilities dictates the need for enhancing the performance of Wireless Intrusion Detection Systems (WIDSs) to detect all attacks on RSNs with less false positive and false negative rates

    Aerospace Medicine and Biology

    Get PDF
    This bibliography lists 184 reports, articles and other documents introduced into the NASA Scientific and Technical Information System during October 1989. Subject coverage includes: aerospace medicine and psychology, life support systems and controlled environments, safety equipment, exobiology and extraterrestrial life, and flight crew behavior and performance

    Underwater Central California: A Guide to Saving Your Ocean Heritage

    Get PDF
    Describes the state of the wildlife and habitats inside the three national marine sanctuaries that stretch along the coast of central California, and identifies key threats to the future of California's coast

    Toward a Guide for Smart Mobility Corridors: Frameworks and Tools for Measuring, Understanding, and Realizing Transportation Land Use Coordination

    Get PDF
    The coordination of transportation and land use (also known as “smart growth”) has been a long-standing goal for planning and engineering professionals, but to this day it remains an elusive concept to realize. Leaving us with this central question -- how can we best achieve transportation and land use coordination at the corridor level? In response, this report provides a review of literature and practice related to sustainability, livability, and equity (SLE) with a focus on corridor-level planning. Using Caltrans’ Corridor Planning Process Guide and Smart Mobility Framework as guideposts, this report also reviews various principles, performance measures, and place typology frameworks, along with current mapping and planning support tools (PSTs). The aim being to serve as a guidebook that agency staff can use for reference, synergizing planning insights from various data sources that had not previously been brought together in a practical frame. With this knowledge and understanding, a key section provides a discussion of tools and metrics and how they can be used in corridor planning. For illustration purposes, this report uses the Smart Mobility Calculator (https://smartmobilitycalculator. netlify.app/), a novel online tool designed to make key data easily available for all stakeholders to make better decisions. For more information on this tool, see https://transweb.sjsu.edu/research/1899-Smart-Growth-Equity-Framework-Tool. The Smart Mobility Calculator is unique in that it incorporates statewide datasets on urban quality and livability which are then communicated through a straightforward visualization planners can readily use. Core sections of this report cover the framework and concepts upon which the Smart Mobility Calculator is built and provides examples of its functionality and implementation capabilities. The Calculator is designed to complement policies to help a variety of agencies (MPOs, DOTs, and local land use authorities) achieve coordination and balance between transportation and land use at the corridor level

    Industrial control protocols in the Internet core: Dismantling operational practices

    Get PDF
    Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.g., by DRDoS attacks). In this paper, we measure and analyze inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. These traffic observations are correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We uncover mainly unprotected inter-domain ICS traffic and provide an in-depth view on Internet-wide ICS communication. Our results can be used (i) to create precise filters for potentially harmful non-industrial ICS traffic and (ii) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks. Additionally, we survey recent security extensions of ICS protocols, of which we find very little deployment. We estimate an upper bound of the deployment status for ICS security protocols in the Internet core
    corecore