{"title":"防御基于以太网的网络攻击","authors":"Sandip Shinde, Harsh Mehta","doi":"10.1109/ICECCT56650.2023.10179830","DOIUrl":null,"url":null,"abstract":"The maritime industry has integrated a lot of automation in electronics since past few decades and will be investing more in upcoming years. This development has reduced a lot of manual work but has also introduced a lot of security vulnerabilities. As marine ships categorize as critical infrastructure, proper security measures must be taken to reduce the attack surface. This study focuses on a possible attack strategy using ethernet based network (IEC 61162–450) which could result into potential capsize of the ship. This study refers Furuno's device manuals for forming an overview of the internal network of the ship. The attack script utilizes User Datagram Protocol to send malicious data packets into the network; specifically, injects fake Global Positioning System coordinates to implement Global Positioning System spoofing attack on Electronic Chart Display and Information System. Post that, a mitigation strategy in form of a PowerShell script is proposed. The script implements features of threat hunting as it identifies and terminates malicious programs injecting data packets into the internal network. This study proposes to implement automated threat detection and response-based program to be implemented on all Information Technology systems to reduce the impact of a possible intrusion by an external threat actor.","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Defending Marine Ships against Ethernet based Cyberattacks\",\"authors\":\"Sandip Shinde, Harsh Mehta\",\"doi\":\"10.1109/ICECCT56650.2023.10179830\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The maritime industry has integrated a lot of automation in electronics since past few decades and will be investing more in upcoming years. This development has reduced a lot of manual work but has also introduced a lot of security vulnerabilities. As marine ships categorize as critical infrastructure, proper security measures must be taken to reduce the attack surface. This study focuses on a possible attack strategy using ethernet based network (IEC 61162–450) which could result into potential capsize of the ship. This study refers Furuno's device manuals for forming an overview of the internal network of the ship. The attack script utilizes User Datagram Protocol to send malicious data packets into the network; specifically, injects fake Global Positioning System coordinates to implement Global Positioning System spoofing attack on Electronic Chart Display and Information System. Post that, a mitigation strategy in form of a PowerShell script is proposed. The script implements features of threat hunting as it identifies and terminates malicious programs injecting data packets into the internal network. This study proposes to implement automated threat detection and response-based program to be implemented on all Information Technology systems to reduce the impact of a possible intrusion by an external threat actor.\",\"PeriodicalId\":180790,\"journal\":{\"name\":\"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCT56650.2023.10179830\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCT56650.2023.10179830","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defending Marine Ships against Ethernet based Cyberattacks
The maritime industry has integrated a lot of automation in electronics since past few decades and will be investing more in upcoming years. This development has reduced a lot of manual work but has also introduced a lot of security vulnerabilities. As marine ships categorize as critical infrastructure, proper security measures must be taken to reduce the attack surface. This study focuses on a possible attack strategy using ethernet based network (IEC 61162–450) which could result into potential capsize of the ship. This study refers Furuno's device manuals for forming an overview of the internal network of the ship. The attack script utilizes User Datagram Protocol to send malicious data packets into the network; specifically, injects fake Global Positioning System coordinates to implement Global Positioning System spoofing attack on Electronic Chart Display and Information System. Post that, a mitigation strategy in form of a PowerShell script is proposed. The script implements features of threat hunting as it identifies and terminates malicious programs injecting data packets into the internal network. This study proposes to implement automated threat detection and response-based program to be implemented on all Information Technology systems to reduce the impact of a possible intrusion by an external threat actor.