Securing remote access networks using malware detection tools for industrial control systems

  • Author(s) / Creator(s)
  • With their role as an integral part of its infrastructure, Industrial Control Systems (ICS) are a vital part of every nation’s industrial development drive. Like every other facet of life, ICS have
    witnessed the integration of Information Systems (IS) into their processes, connecting them to the much larger Internet of Things (IoT). Despite several significant advancements--such as
    controlled-environment agriculture, automated train systems, and smart homes, achieved in critical infrastructure sectors through the integration of IS and remote capabilities with ICS, the
    fact remains that these advancements have also introduced vulnerabilities that were previously either non-existent or negligible, one being Remote Access Trojans (RATs). RATs are a crucial tool for every advanced persistent threat (APT) attack mounted against any organization, and as such attackers put a lot of effort into making them as undetectable as possible. Present RAT detection methods either focus on monitoring network traffic or studying event logs on host systems. This research’s objective is the detection of RATs by comparing actual utilized system capacity to reported utilized system capacity. To achieve the research objective, open-source RAT detection methods were identified and analyzed, a GAP-analysis approach was used to identify the deficiencies of each method, after which control algorithms were developed into source code used in developing the solution.

  • Date created
    2021-04-16
  • Subjects / Keywords
  • Type of Item
    Conference/Workshop Poster
  • DOI
    https://doi.org/10.7939/r3-dcj7-3q23
  • License
    Attribution-NonCommercial 4.0 International