Search results

  1. Profinet, DNP3, Modbus and BACnet: Using DPI to decode IIoT traffic

    Devil’s Ivy is a chain attack that targets IIoT devices with the aim of infiltrating enterprise networks. Current operational technology (OT) protocols leave IIoT devices vulnerable to such attacks and many other forms of emerging cyber threats. Also, in IIoT, slight lags in the application or cloud performance and minor latencies in last-mile networks can massively impair machines and equipment ground performance. However, these issues can remain undetected for months or even years. DPI tools help in fortifying IIoT networks and securing enterprise production environments

    Blog post

All results loaded