Download presentation
Presentation is loading. Please wait.
1
Center for Cyber Warfare
Engineering Enclave for Maritime Security A physical voyage control network and key components (ICS) deployed on USN, USNS, and civilian ships Principle Questions: How do the components work and what protocols do they use? What data do they store and record How and where? What happens when bad inputs are applied? What can be done to close vulnerabilities? Pursuing multiple aspects of a larger project involving JHU-APL and other entities Introduction Background Modeling Detection Conclusions
2
EEMS Progress To-Date Mapping the network and connections
Metering and tapping the flows
3
EEMS Security Analysis: Network Exploration and Mapping
Source: Furuno
4
EEMS Security Analysis: Research Options
Vulnerability analysis of Weatherfax Hack a web server set in an ICS Software reverse engineering of VDR Big data exploration and analysis of AIS traffic + VDR-retained data Voyage Network traffic analysis: Network anomaly detection Component Analysis, Hardware RE, and Simulation VHF bridge-to-bridge, GPS, NAVTEX, etc.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.