Investigating the Viability of Fingerprinting the Toolset Used to Probe an Operational Technology Network, Providing Another Indicative Vector to Use in Intrusion Detection Systems.
-
Updated
Feb 15, 2021 - HTML
Investigating the Viability of Fingerprinting the Toolset Used to Probe an Operational Technology Network, Providing Another Indicative Vector to Use in Intrusion Detection Systems.
A collection of scripts focusing on simulating a small ICS and conducting security assessments on it.
✨ NaInSec Special Repository ✨
CPS & IoT security labs (UniPD)
OT Early Warning System or Rust TCP Port Scanner and Listener Application
Code that I have written/modified in multiple programming languages .
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, MALICIOUS GOOSE packets, and benign SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
JSON file that contains an update metadata of Automation Protocols (Industrial control system, process automation, building automation, automatic meter reading, and automobile)
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, benign SV packets, and MALICIOUS SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
A simple high-level Python interface for the Dragos portal API
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
NGFW stands for network gateway firewall this is mainly designed for iot and ICS environments the project still in blue prints
A formally verified implementation of a bolt-on security device for ICS networks. Designed with TLA+ and written/proved in F*
A tool for gathering IT/OT exposed assets on the Internet and sending the results to a MISP instance for further Threat Intelligence analysis.
Simple and automated way of gathering alerts about vulnerabilities and threats regarding ICS/SCADA reported by CISA.
Suricata rules for SCADA
Secure SCADA Protocol 21 Specification
A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity.
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
Add a description, image, and links to the ics-security topic page so that developers can more easily learn about it.
To associate your repository with the ics-security topic, visit your repo's landing page and select "manage topics."