Preview

Doklady BGUIR

Advanced search

MONITORING OF INTERNET-FACING TECHNOGENIC OBJECTS

https://doi.org/10.35596/1729-7648-2019-124-6-80-86

Abstract

The approach to detection and monitoring of Internet-facing technogenic objects has been described. The method of analysis of public services Shodan and Censys has been proposed. The automation monitoring software has been developed.  

About the Authors

D. S. Smoliak
Belarusian State University of Informatics and Radioelectronics
Belarus

Smoliak Dmitry Sergeevich, postgraduate student of information security department

220013, Minsk, P. Brovka str., 6



S. N. Petrov
Belarusian State University of Informatics and Radioelectronics
Belarus

PhD, associate professor, associate professor of information security department

220013, Minsk, P. Brovka str., 6



T. A. Pulko
Belarusian State University of Informatics and Radioelectronics
Belarus

PhD, associate professor, associate professor of information security department

220013, Minsk, P. Brovka str., 6



References

1. SCADA-based water system hacked [Electronic resource]. URL: https://www.scmagazineuk.com/scada-based-water-system-hacked/article/547552 (date of access: 11.02.2019).

2. Cyber-Attack Against Ukrainian Critical Infrastructure [Electronic resource]. URL: https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01 (date of access: 11.01.2019).

3. Guide to Industrial Control Systems (ICS) Security [Electronic resource]. URL: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf (date of access: 12.01.2019).

4. Traffic light controls – Shodan finds the Internet's most dangerous spots [Electronic resource]. URL: http://money.cnn.com/gallery/technology/security/2013/05/01/shodan-most-dangerous-internet-searches/index.html (date of access: 11.01.2019).

5. Project SHINE: 1,000,000 Internet-Connected SCADA and ICS Systems and Counting [Electronic resource]. – URL: http://www.tofinosecurity.com/blog/project-shine-1000000-internet-connected-scada-and-ics-systems-and-counting (date of access: 11.01.2019).

6. SCADA cybersecurity in the age of the Internet of Things [Electronic resource]. URL: https://www.controleng.com/single-article/scada-cybersecurity-in-the-age-of-the-internet-of-things/94eccaddb83842690e375274395e629e.html (date of access: 21.01.2019).

7. Shodan [Electronic resource]. URL: https://www.shodan.io (date of access: 20.02.2019).

8. Censys [Electronic resource]. URL: https://censys.io (date of access: 20.02.2019).


Review

For citations:


Smoliak D.S., Petrov S.N., Pulko T.A. MONITORING OF INTERNET-FACING TECHNOGENIC OBJECTS. Doklady BGUIR. 2019;(6):80-86. (In Russ.) https://doi.org/10.35596/1729-7648-2019-124-6-80-86

Views: 1155


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1729-7648 (Print)
ISSN 2708-0382 (Online)