Seeing in the Dark: ICS Network Visibility December 3, 2015 In this post I will describe the usage of an IDS (Intrusion Detection System) tool for achieving Network Visibility in ICS networks. This post will be divided into two sections. First, I will cover the...
Industrial IDS Deployment By Yehonatan Kfir, CTO, Radiflow October 28, 2015 Background In our previous posts we discussed the various types of attacks on operational (OT) networks. We’ve also discussed the means of mitigating different types of attacks, with the...
Revealing Web-Connected Critical Devices By Yehonatan Kfir, CTO, Radiflow September 30, 2015 Background In my last entry I mentioned shortly the reconnaissance stage in ICS attack campaigns. In this post I will present the risks involved, and I will describe one of...
Yes We SCAN! By Yehonatan Kfir, CTO, Radiflow Early detection of ICS attacks decreases the probability of causing damage to the network. In this post I will focus on one of the first stages in ICS attacks, where the attacker attempts to scan the network for devices....
Designing an ICS Attack Platform August 3, 2015 The vulnerabilities of ICS networks have been well-discussed. Still, most of the discussion has been focused on the damage to specific devices (as seen in the coverage of the Aurora demonstration, or in some PLC vendors’...
ICS Firewall Deployment June 29, 2015 We take it as a given that it’s essential to deploy firewalls inside ICS networks. However, it is less clear why and which properties should such firewalls have: should they be stateful? DPI? Signature-based? In this post I will...
Recent Comments