Emmanuele Zambon @ TU/e
Emmanuele Zambon @ TU/e
Home
Projects
Publications
Teaching
Contact
Light
Dark
Automatic
1
Sequence-aware Intrusion Detection in Industrial Control Systems
Our paper discusses a specific type of semantic attack involving “sequences of events”. Common network intrusion detection systems (NIDS) generally search for single, unusual or “not permitted” operations. In our case, rather than a malicious event, we show how a specific series of “permitted” operations can elude standard intrusion detection systems and still damage an infrastructure.
Marco Caselli
,
Emmanuele Zambon
,
Frank Kargl
PDF
Cite
Project
DOI
Through the eye of the PLC: semantic security monitoring for industrial processes
Off-the-shelf intrusion detection systems prove an ill fit for protecting industrial control systems. Specifically, current systems fail to detect recent process control attacks. In this work we present a detector that continuously tracks updates to corresponding process variables to then derive variable-specific prediction models as the basis for assessing future activity.
Dina Hadžiosmanović
,
Robin Sommer
,
Emmanuele Zambon
,
Pieter H. Hartel
PDF
Cite
Project
Project
DOI
On Emulation-Based Network Intrusion Detection Systems
In this paper we investigate and test the actual effectiveness of emulation-based detection and show that the detection can be circumvented by employing a wide range of evasion techniques, exploiting weakness that are present at all three levels in the detection process. We draw the conclusion that current emulation-based systems have limitations that allow attackers to craft generic shellcode encoders able to circumvent their detection mechanisms.
Ali Abbasi
,
Jos Wetzels
,
Wouter Bokslag
,
Emmanuele Zambon
,
Sandro Etalle
Cite
DOI
On the Feasibility of Device Fingerprinting in Industrial Control Systems
In this paper we provide an overview of standard device fingerprinting techniques and an assessment on the application feasibility in ICS infrastructures. We identify challenges that fingerprinting has to face and mechanisms to be used to obtain reliable results. Finally, we provide guidelines for implementing reliable ICS fingerprinters.
Marco Caselli
,
Dina Hadžiosmanović
,
Emmanuele Zambon
,
Frank Kargl
PDF
Cite
DOI
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols
In this paper we investigate the effectiveness of a widely studied category of network intrusion detection systems: anomaly-based algorithms using n-gram analysis for payload inspection. Our tests show that the analyzed systems, in presence of data with high variability, cannot deliver high detection and low false positive rates at the same time.
Dina Hadžiosmanović
,
Lorenzo Simionato
,
Damiano Bolzoni
,
Emmanuele Zambon
,
Sandro Etalle
PDF
Cite
Project
DOI
CRAC: Confidentiality risk assessment and IT-infrastructure comparison
CRAC is an IT-infrastructure-based method for assessing and comparing confidentiality risks of distributed IT systems. The method …
Ayşe Moralı
,
Emmanuele Zambon
,
Sandro Etalle
,
Roel Wieringa
PDF
Cite
DOI
Extended eTVRA vs. security checklist: Experiences in a value-web
In this paper, we evaluate the time and resource efficiency of parts of eTVRA and the quality of the result produced by following eTVRA compared to a more pragmatic approach (Protection Profile-based checklists). We use both approaches to identify and analyze risks of a new SIM card currently under joint development by a small hardware company and a large Telco provider.
Ayşe Moralı
,
Emmanuele Zambon
,
Siv Hilde Houmb
,
Karin Sallhammar
,
Sandro Etalle
PDF
Cite
DOI
IT confidentiality risk assessment for an architecture-based approach
In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The approach is based on a model integrating information assets and the IT infrastructure that they rely on for distributed systems.
Ayşe Moralı
,
Emmanuele Zambon
,
Sandro Etalle
,
P.L. Overbeek
PDF
Cite
DOI
A Model Supporting Business Continuity Auditing and Planning in Information Systems
In this paper we present a model and a tool supporting BCP auditing by allowing IT personnel to estimate and validate the recovery time objectives (to be) set on the various processes of the organization. Our tool can be integrated in COBIT-based risk assessment applications. Finally, we argue that our tool can be particularly useful for the dynamic auditing of the BCP.
Emmanuele Zambon
,
Damiano Bolzoni
,
Sandro Etalle
,
Marco Salvato
PDF
Cite
DOI
Model-Based Mitigation of Availability Risks
In this paper we define a method and a tool for carrying out a risk mitigation activity which allows us to assess the global impact of a set of risks and to choose the best set of countermeasures to cope with them. To this end, the presence of a tool is necessary, due to the high complexity of the assessment problem. Our approach can be integrated in present risk management methodologies (e.g. COBIT) to provide a more precise risk mitigation activity.
Emmanuele Zambon
,
Damiano Bolzoni
,
Sandro Etalle
,
Marco Salvato
PDF
Cite
DOI
«
»
Cite
×