Center for Cyber Warfare Engineering Enclave for Maritime Security A physical voyage control network and key components (ICS) deployed on USN, USNS, and civilian ships Principle Questions: How do the components work and what protocols do they use? What data do they store and record How and where? What happens when bad inputs are applied? What can be done to close vulnerabilities? Pursuing multiple aspects of a larger project involving JHU-APL and other entities Introduction Background Modeling Detection Conclusions
EEMS Progress To-Date Mapping the network and connections Metering and tapping the flows
EEMS Security Analysis: Network Exploration and Mapping Source: Furuno
EEMS Security Analysis: Research Options Vulnerability analysis of Weatherfax Hack a web server set in an ICS Software reverse engineering of VDR Big data exploration and analysis of AIS traffic + VDR-retained data Voyage Network traffic analysis: Network anomaly detection Component Analysis, Hardware RE, and Simulation VHF bridge-to-bridge, GPS, NAVTEX, etc.