@inproceedings{639ab182c7594097a5b0d6be9200f79c,
title = "Security implications of publicly reachable building automation systems",
abstract = "In a connected world Internet security is becoming increasingly important. Attacks, which are frequently executed by botnets, can impact people in their everyday life. A ubiquitous kind of attack is the amplification attack, a special type of Denial-of-Service attack. Several protocols such as DNS, NTP, and SNMP are known to be vulnerable to amplification attacks when security practices are not followed. In this work we evaluate the vulnerability of BACnet, a building automation and control protocol, to amplification attacks. To assess BACnet's vulnerability we conduct active traffic measurements on an Internet-wide scale. We find 16 485 BACnet devices, the largest number to date. Additionally, more than 14 k of these devices can be misused as amplifiers, with some generating amplification factors up to 120. To remediate this potential threat we employ a vulnerability notification campaign in close coordination with a CERT. Finally, we also give suggestions to thwart the amplification attack potential of BACnet.",
keywords = "DDoS, amplification, bacnet, building automation",
author = "Oliver Gasser and Quirin Scheitle and Carl Denis and Nadja Schricker and Georg Carle",
note = "Publisher Copyright: {\textcopyright} 2017 IEEE.; 12th IEEE Symposium on Security and Privacy Workshops, SPW 2017 ; Conference date: 25-05-2017",
year = "2017",
month = dec,
day = "19",
doi = "10.1109/SPW.2017.13",
language = "English",
series = "Proceedings - 2017 IEEE Symposium on Security and Privacy Workshops, SPW 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "199--204",
booktitle = "Proceedings - 2017 IEEE Symposium on Security and Privacy Workshops, SPW 2017",
}