Dissecting Industrial Control Systems Protocol for Deep Packet Inspection
Cover - CISSE Volume 1, Issue 1
PDF

Keywords

Industrial Control Systems (ICS)
Network Protocols
Deep Packet Inspection
Firewall
Intrusion Prevention
SCADA

How to Cite

Dissecting Industrial Control Systems Protocol for Deep Packet Inspection. (2013). Journal of The Colloquium for Information Systems Security Education, 1(1), 6. https://journal.cisse.info/jcisse/article/view/4

Abstract

The nation's critical infrastructures, such as those found in industrial control systems (ICS), are increasingly at risk and vulnerable to internal and external threats. One of the traditional ways of controlling external threats is through a network device called a firewall. However, given that the payload for controlling the ICS is usually encapsulated in other protocols, the tendency is for the firewall to allow packets that appear to be innocuous. These seemingly harmless packets can be carriers for sinister attacks that are buried deep into the payload. The purpose of this paper is to present the different ICS protocol header signatures for the purpose of devising deep packet inspection strategies that can be implemented in network firewalls.

PDF

Open Access License Notice:

This article is © its author(s) and is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). Beginning with Volume 13 (2026), this license is included directly within all published PDFs. For earlier articles, a cover page has been added to indicate the correct licensing terms. Any legacy copyright or pricing statements appearing within the PDF reflect prior print production workflows and do not represent the Journal’s current open access policy. For full details, please see the Journal’s License Terms.