The increased adoption of the Internet Protocol (IP) in ICSs has made these systems vulnerable to the same security risks that are present in traditional IT environments. The legacy nature of ICSs and their unique operational requirements make them vulnerable to security threats that are different from those in IT environments. In this paper, we describe a protocol, named ArpON, which is able to wipe out in quasi real time any ARP cache poisoning attempt, thus making it ineffective. Contrarily to solutions presented in the literature for contrasting ARP cache poisoning, ArpON incurs in low operational costs, is backward compatible, transparent to the ARP protocol and does not use any HW feature nor cryptography functionality. We also model and validate ArpON in the OMNET++ network simulator. The simulation results show that ArpON is effective in avoiding ARP poisoning, and its communication overhead is negligible with respect to classical ARP protocol.

Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks / D. Bruschi, A. Di Pasquale, A. Lanzi, E. Pagani. - In: JOURNAL OF COMPUTER SECURITY. - ISSN 0926-227X. - (2024 Feb 01). [Epub ahead of print] [10.3233/jcs-230023]

Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks

D. Bruschi
Primo
;
A. Lanzi
Penultimo
;
E. Pagani
Ultimo
2024

Abstract

The increased adoption of the Internet Protocol (IP) in ICSs has made these systems vulnerable to the same security risks that are present in traditional IT environments. The legacy nature of ICSs and their unique operational requirements make them vulnerable to security threats that are different from those in IT environments. In this paper, we describe a protocol, named ArpON, which is able to wipe out in quasi real time any ARP cache poisoning attempt, thus making it ineffective. Contrarily to solutions presented in the literature for contrasting ARP cache poisoning, ArpON incurs in low operational costs, is backward compatible, transparent to the ARP protocol and does not use any HW feature nor cryptography functionality. We also model and validate ArpON in the OMNET++ network simulator. The simulation results show that ArpON is effective in avoiding ARP poisoning, and its communication overhead is negligible with respect to classical ARP protocol.
industry 4.0; ARP; ARP poisoning; Man-In-The-Middle attacks; secure ARP
Settore INF/01 - Informatica
1-feb-2024
1-feb-2024
Article (author)
File in questo prodotto:
File Dimensione Formato  
jcs-prepress_jcs--1--1-jcs230023_jcs--1-jcs230023.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 1.18 MB
Formato Adobe PDF
1.18 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/1038195
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact