Abstract
The nation's critical infrastructures, such as those found in industrial control systems (ICS), are increasingly at risk and vulnerable to internal and external threats. One of the traditional ways of controlling external threats is through a network device called a firewall. However, given that the payload for controlling the ICS is usually encapsulated in other protocols, the tendency is for the firewall to allow packets that appear to be innocuous. These seemingly harmless packets can be carriers for sinister attacks that are buried deep into the payload. The purpose of this paper is to present the different ICS protocol header signatures for the purpose of devising deep packet inspection strategies that can be implemented in network firewalls.
Open Access License Notice:
This article is © its author(s) and is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). Beginning with Volume 13 (2026), this license is included directly within all published PDFs. For earlier articles, a cover page has been added to indicate the correct licensing terms. Any legacy copyright or pricing statements appearing within the PDF reflect prior print production workflows and do not represent the Journal’s current open access policy. For full details, please see the Journal’s License Terms.