earticle

논문검색

ICS malware Triton attack and countermeasures.

원문정보

Jin-woo Myung, Sunghyuck Hong

피인용수 : 0(자료제공 : 네이버학술정보)

초록

영어

Triton is the world’s most serious malware and it’s now spreading by all over the networks. The hackers has deployed malicious code or malware which let them take over the plant’s safety instrumented systems. These physical controllers and their associated software codes are the last line of defense against life-threatening crisis. Many factories now perform automated processes using computers. However, in 2017 an attack aimed at this emerged. We have detected that a malicious program is installed in the emergency safety device. All of the automation equipment used in these industrial sites is called ICS, and Triton is one of the malicious codes targeting these ICSs. After the hacker sets up the target, the attacker uses a secure shell (SSH) based tunnel to deliver the attack tool and execute remote commands of the program after accessing the IT and OT networks, installing back doors in the computer network, and then accessing the target safety instrumentation system (SIS) controller in the OT network while scouting the network, moving the internal network, and maintaining access. Therefore, we proposed ICS malware for countermeasure to prevent from Triton attack.

목차

Abstract
I. INTRODUCTION
II. TRITON
A. TRITON
B. TRITON Attack Method
C. TRITON Attack Response
REFERENCES

저자정보

  • Jin-woo Myung Student, Division of ICT, Baekseok University, KOREA
  • Sunghyuck Hong Professor, Division of ICT, Baekseok University, KOREA

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 기관로그인 시 무료 이용이 가능합니다.
      ※ 학술발표대회집, 워크숍 자료집 중 4페이지 이내 논문은 '요약'만 제공되는 경우가 있으니, 구매 전에 간행물명, 페이지 수 확인 부탁 드립니다.

      • 4,000원

      0개의 논문이 장바구니에 담겼습니다.