Skip to main content

Industrial Traffic Collection: Understanding the implications of Deploying visibility without impacting production

Due to the critical nature of industrial environments and the lifetime of deployed assets, many organizations do not have complete knowledge of what assets are operating in the environment and what communications are involved. With the continuous move to IP based communications for controls equipment, Cybersecurity continues to increase in importance and is a priority for many executives. Industrial controls are unique because they are interfacing with the real world, which has implications on human safety and the ability of an organization to maintain operations. Unfortunately, the criticality of these devices and the lack of robust network functions on many often requires the use of passive solutions to gather information. This paper will focus on outlining the potential impact of collecting network traffic, discussing the functions available on networking equipment to enable it, identifying possible deployment architectures and the pros and cons of each, and explaining a methodology to calculate the potential impacts.

39810 (PDF, 1.99MB)

21 Sep 2020
ByDaniel Behrens
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

Sanitized in the Source: Removing Embedded Objects from PLC Projects with CDR

Research Paper

This research seeks to outline a methodology to sanitize supported PLC project files for security while also confirming their operational reliability.

  • 16 Apr 2026

ICS Asset Inventory: Passive, or Active? Siemens S7-1200 PLCs

Research Paper

This research builds on previous research to determine what information can and cannot be gleaned solely from passive traffic analysis, specifically for a Siemens S7-1200 PLC.

  • 12 Mar 2026

Protecting OT’s Inherent Front-End Vulnerabilities: Legacy SQL Dependencies in Building Automation Systems Through the Lens of the SANS ICS Five Critical Controls

Research Paper

This research presents a practical method for building a Software Bill of Materials (SBOM) for BAS front ends, augmenting it with Shodan exposure analysis, classifying it in a risk heat map, and mitigating using the SANS ICS Five Controls, with an emphasis on Risk-Based Vulnerability Management and Defensible Architecture.

  • 9 Feb 2026

Inside the Five Most Dangerous New Attack Techniques

Research Paper

This e-book represents the next evolution of that effort. Here, we take the five key topics presented from the keynote stage and expand them into four full-length chapters.

  • 8 Dec 2025
  • Heather Barnhart, Rob T. Lee, Joshua Wright, Tim Conway

Code Modularity as a Heuristic for Malware Design

Research Paper

Malware targeting industrial control systems (ICS) and critical infrastructure often exhibits a modular architecture, using a central loader to execute interchangeable payload modules.

  • 7 Nov 2025

Webs of Deception: Using the SANS ICS Kill Chain to Flip the Advantage to the Defender

Research Paper

Defending a small Industrial Control System (ICS) against sophisticated threats can seem futile. The...

  • 14 Apr 2025

Industrial Control System Internal Network Security Monitoring with Open-Source Tools

Research Paper

Security vendors have made many advances in internal network security monitoring (INSM) in recent...

  • 5 Dec 2024

False Data Injection Attacks Against Distribution Automation Systems

Research Paper

Utility companies increasingly rely on automated switching to provide their customers with a...

  • 5 Dec 2024

Shedding Light on OT Anomalies: Parsing Proprietary OT Protocols with Zeek

Research Paper

Many traditional intrusion detection systems (IDS) may struggle with the unique devices and...

  • 9 Oct 2024

SANS 2024 State of ICS/OT Cybersecurity

Research Paper

This white paper, SANS Certified Instructor Jason Christopher explores the growing trends in cyber...

  • 9 Oct 2024
  • SANS Institute

Mode Matters: Monitoring PLCs for Detecting Potential ICS/OT Incidents

Research Paper

There is a blind spot regarding cyber security in many Industrial Control Systems (ICS)and...

  • 28 Feb 2024

Can Open-Source Tools Be Used to Safely Scan a Modern ICS Environment?

Research Paper

This research delves into the long-standing belief within the Operational Technology (OT) security...

  • 27 Nov 2023

Private 5G, "Not as Private as You May Think"

Research Paper

Private 5G networks and the transition to Industry 4.0 are gaining traction as demand increases for...

  • 10 Oct 2023

Implementing Scalable Security for Devices Without 802.1x Support

Research Paper

Enterprises often implement 802.1x to control access to wired and wireless networks by...

  • 21 Dec 2022

Transparently Insecure Operational Technology: A Contextual Analysis

Research Paper

In cybersecurity, countering threats depends on an ability to see and respond to attacks. However,...

  • 6 Jan 2022

You Cannot Defend What You Cannot See: Gaining Insight into Proprietary Protocols through Custom Parsers with Zeek

Research Paper

A vital component of any information security architecture is a network intrusion detection...

  • 6 Jan 2022

Collection and Analysis of Serial-Based Traffic in Critical Infrastructure Control Systems

Research Paper

There is a blind spot the size of a 27-ton, 2.25-megawatt maritime diesel generator in the world's...

  • 11 Feb 2021

Fashion Industry (Securely) 4.0ward

Research Paper

The fashion market segment is going through a significant technological upgrade. The need to meet...

  • 9 Sep 2020

60870-5-104 protocol snort rule customization

Research Paper

OT Security emerges as a necessity due to its flat network implementation and criticality of systems...

  • 10 Aug 2020

Vulnerabilities on the Wire: Mitigations for Insecure ICS Device Communication

Research Paper

Modbus TCP and other legacy ICS protocols ported over from serial communications are still widely...

  • 12 Feb 2020
  • Michael Hoffman