{"id":6172,"date":"2020-05-27T07:44:51","date_gmt":"2020-05-27T05:44:51","guid":{"rendered":"http:\/\/inprosec.com\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/"},"modified":"2020-05-27T07:44:51","modified_gmt":"2020-05-27T05:44:51","slug":"plc-vulnerabilities-and-intrusion-detection-systems-iids","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/","title":{"rendered":"PLC vulnerabilities and Intrusion Detection Systems IIDS"},"content":{"rendered":"<p>In today&#8217;s post, &#8220;Survey: PLC vulnerabilities and Industrial Intrusion Detection Systems IISD&#8221;, a new article by Saber Mhiri, CRO (Chief Research Officer) of InprOTech. He explains through several recent works the vulnerabilities of PLC and different protocols to avoid them. Different techniques of IDS industrial intrusion detection systems are also presented, as well as a recently proposed work to protect industrial control systems (ICS).<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a style=\"background: #084671; color: #fff; padding: 8px 15px !important; border-radius: 3px; font-size: 20px;\" href=\"https:\/\/inprosec.es\/wp-content\/uploads\/2020\/05\/T1_2020_paper_corrected.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Download\u00a0 Tech Paper<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s post, &#8220;Survey: PLC vulnerabilities and Industrial Intrusion Detection Systems IISD&#8221;, a new article by Saber Mhiri, CRO (Chief Research Officer) of InprOTech. He explains through several recent works the vulnerabilities of PLC and different protocols to avoid them. Different techniques of IDS industrial intrusion detection systems are also presented, as well as a&#8230;<\/p>\n","protected":false},"author":6,"featured_media":4799,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[54,58],"tags":[],"class_list":["post-6172","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","category-inprotech-auto"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PLC vulnerabilities and Intrusion Detection Systems IIDS - Inprosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PLC vulnerabilities and Intrusion Detection Systems IIDS\" \/>\n<meta property=\"og:description\" content=\"In today&#8217;s post, &#8220;Survey: PLC vulnerabilities and Industrial Intrusion Detection Systems IISD&#8221;, a new article by Saber Mhiri, CRO (Chief Research Officer) of InprOTech. He explains through several recent works the vulnerabilities of PLC and different protocols to avoid them. Different techniques of IDS industrial intrusion detection systems are also presented, as well as a...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-27T05:44:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/post-27-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"PLC vulnerabilities and Intrusion Detection Systems IIDS\",\"datePublished\":\"2020-05-27T05:44:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/\"},\"wordCount\":76,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/post-27-5.jpg\",\"articleSection\":[\"Cybersecurity\",\"InprOTech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/\",\"name\":\"PLC vulnerabilities and Intrusion Detection Systems IIDS - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/post-27-5.jpg\",\"datePublished\":\"2020-05-27T05:44:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/post-27-5.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/post-27-5.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/plc-vulnerabilities-and-intrusion-detection-systems-iids\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PLC vulnerabilities and Intrusion Detection Systems IIDS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PLC vulnerabilities and Intrusion Detection Systems IIDS - Inprosec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/","og_locale":"en_US","og_type":"article","og_title":"PLC vulnerabilities and Intrusion Detection Systems IIDS","og_description":"In today&#8217;s post, &#8220;Survey: PLC vulnerabilities and Industrial Intrusion Detection Systems IISD&#8221;, a new article by Saber Mhiri, CRO (Chief Research Officer) of InprOTech. He explains through several recent works the vulnerabilities of PLC and different protocols to avoid them. Different techniques of IDS industrial intrusion detection systems are also presented, as well as a...","og_url":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/","og_site_name":"Inprosec","article_published_time":"2020-05-27T05:44:51+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/post-27-5.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"PLC vulnerabilities and Intrusion Detection Systems IIDS","datePublished":"2020-05-27T05:44:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/"},"wordCount":76,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/post-27-5.jpg","articleSection":["Cybersecurity","InprOTech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/","url":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/","name":"PLC vulnerabilities and Intrusion Detection Systems IIDS - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/post-27-5.jpg","datePublished":"2020-05-27T05:44:51+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/post-27-5.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/post-27-5.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"PLC vulnerabilities and Intrusion Detection Systems IIDS"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/6172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=6172"}],"version-history":[{"count":0,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/6172\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/4799"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=6172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=6172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=6172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}