The Landscape of Industrial Control Systems (ICS) Devices on the Internet

Industrial control systems are employed in numerous critical infrastructure assets. Originally designed for closed systems, these protocols do not have built-in security. If these systems are the target of a cyberattack, it will cause serious damage to the physical world, However, there is an increasing number of ICS devices on the Internet. In order to study the number, distribution and trend of these systems, we analyzed the Censys scanning data for the five protocols of Modbus, Siemens S7, DNP3, BACnet, Tridium Fox. We find that there are still a large number of devices exposed on the Internet, distributed in more than 100 countries around the world, and the overall number of devices has been on the rise in the last two years. Separately, in the past two years, the number of Modbus and Siemens S7 protocol continued to grow rapidly, the number of DNP3 protocol devices has declined, and the number of BACnet and Tridium Fox protocol devices has basically remained unchanged. By analyzing the IP addresses of these devices, we find that some of the devices are continually exposed to the Internet, and some of the devices are temporarily exposed. We also find some Conpot honeypot records in these data.

[1]  W. Marsden I and J , 2012 .

[2]  J. Alex Halderman,et al.  A Search Engine Backed by Internet-Wide Scanning , 2015, CCS.

[3]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[4]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[5]  Jaspreet Kaur,et al.  Securing BACnet's Pitfalls , 2015, SEC.

[6]  Eric Wustrow,et al.  ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.

[7]  Robin Berthier,et al.  An Internet-wide view of ICS devices , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[8]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[9]  J. Alex Halderman,et al.  An Internet-Wide View of Internet-Wide Scanning , 2014, USENIX Security Symposium.

[10]  J. Alex Halderman,et al.  Zippier ZMap: Internet-Wide Scanning at 10 Gbps , 2014, WOOT.