Vis enkel innførsel

dc.contributor.authorAmro, Ahmed Walid
dc.contributor.authorGkioulos, Vasileios
dc.date.accessioned2023-02-08T09:44:27Z
dc.date.available2023-02-08T09:44:27Z
dc.date.created2022-11-19T19:28:25Z
dc.date.issued2022
dc.identifier.isbn978-3-031-17143-7
dc.identifier.urihttps://hdl.handle.net/11250/3049159
dc.description.abstractThe maritime domain is among the critical sectors of our way of life. It is undergoing a major digital transformation introducing changes to its operations and technology. The International Maritime Organization urged the maritime community to introduce cyber risk management into their systems. This includes the continuous identification and analysis of the threat landscape. This paper investigates a novel threat against the maritime infrastructure that utilizes a prominent maritime system that is the Automatic Identification System (AIS) for establishing covert channels. We provide empirical evidence regarding its feasibility and applicability to existing and future maritime systems as well as discuss mitigation measures against it. Additionally, we demonstrate the utility of the covert channels by introducing two realistic cyber attacks against an Autonomous Passenger Ship (APS) emulated in a testing environment. Our findings confirm that AIS can be utilized for establishing covert channels for communicating Command & Control (C &C) messages and transferring small files for updating the cyber arsenal without internet access. Also, the establishment and utilization of the covert channels have been found to be possible using existing attack vectors and technologies related to a wide range of maritime systems. We hope that our findings further motivate the maritime community to increase their efforts for integrating cyber security practices into their systems.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.relation.ispartofComputer Security – ESORICS 2022
dc.titleFrom Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacksen_US
dc.title.alternativeFrom Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacksen_US
dc.typeChapteren_US
dc.description.versionacceptedVersionen_US
dc.source.pagenumber535-553en_US
dc.identifier.doi10.1007/978-3-031-17143-7_26
dc.identifier.cristin2076775
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel