Full metadata record
DC poleHodnotaJazyk
dc.contributor.authorNiedermaier, Matthias
dc.contributor.authorFischer, Florian
dc.contributor.authorvon Bodisco, Alexander
dc.contributor.editorPinker, Jiří
dc.date.accessioned2019-10-16T06:51:33Z
dc.date.available2019-10-16T06:51:33Z
dc.date.issued2017
dc.identifier.citation2017 International Conference on Applied Electronics: Pilsen, 5th – 6th September 2017, Czech Republic, p.133-136.en
dc.identifier.isbn978–80–261–0641–8 (Print)
dc.identifier.isbn978–80–261–0642–5 (Online)
dc.identifier.issn1803–7232 (Print)
dc.identifier.issn1805–9597 (Online)
dc.identifier.urihttp://hdl.handle.net/11025/35426
dc.format4 s.cs
dc.format.mimetypeapplication/pdf
dc.language.isoenen
dc.publisherZápadočeská univerzita v Plznics
dc.rights© Západočeská univerzita v Plznics
dc.subjectprotokolycs
dc.subjectmonitoringcs
dc.subjectbezpečnostcs
dc.subjectTCPIPcs
dc.subjectvýstupycs
dc.subjectpočítačecs
dc.subjectintegrované obvodycs
dc.subjectkontrola procesucs
dc.titlePropFuzz — An IT-security fuzzing framework for proprietary ICS protocolsen
dc.typekonferenční příspěvekcs
dc.typeconferenceObjecten
dc.rights.accessopenAccessen
dc.type.versionpublishedVersionen
dc.description.abstract-translatedProgrammable Logic Controllers are used for smart homes, in production processes or to control critical infrastructures. Modern industrial devices in the control level are often communicating over proprietary protocols on top of TCP/IP with each other and SCADA systems. The networks in which the controllers operate are usually considered as trustworthy and thereby they are not properly secured. Due to the growing connectivity caused by the Internet of Things (IoT) and Industry 4.0 the security risks are rising. Therefore, the demand of security assessment tools for industrial networks is high. In this paper, we introduce a new fuzzing framework called PropFuzz, which is capable to fuzz proprietary industrial control system protocols and monitor the behavior of the controller. Furthermore, we present first results of a security assessment with our frameworken
dc.subject.translatedprotocolsen
dc.subject.translatedmonitoringen
dc.subject.translatedsecurityen
dc.subject.translatedTCPIPen
dc.subject.translatedportsen
dc.subject.translatedcomputersen
dc.subject.translatedintegrated circuitsen
dc.subject.translatedprocess controlen
dc.type.statusPeer-revieweden
Vyskytuje se v kolekcích:Applied Electronics 2017
Applied Electronics 2017

Soubory připojené k záznamu:
Soubor Popis VelikostFormát 
Niedermaier.pdfPlný text125,7 kBAdobe PDFZobrazit/otevřít


Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam: http://hdl.handle.net/11025/35426

Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.