Cargando…

A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges

Major public institutions and organizations that handle sensitive data frequently enforce strong security policies by implementing network separation policies that segregates their internal work networks and internet network using air gaps to prevent the leakage of confidential information. Such clo...

Descripción completa

Detalles Bibliográficos
Autores principales: Park, Jangyong, Yoo, Jaehoon, Yu, Jaehyun, Lee, Jiho, Song, JaeSeung
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10054827/
https://www.ncbi.nlm.nih.gov/pubmed/36991925
http://dx.doi.org/10.3390/s23063215
_version_ 1785015765508816896
author Park, Jangyong
Yoo, Jaehoon
Yu, Jaehyun
Lee, Jiho
Song, JaeSeung
author_facet Park, Jangyong
Yoo, Jaehoon
Yu, Jaehyun
Lee, Jiho
Song, JaeSeung
author_sort Park, Jangyong
collection PubMed
description Major public institutions and organizations that handle sensitive data frequently enforce strong security policies by implementing network separation policies that segregates their internal work networks and internet network using air gaps to prevent the leakage of confidential information. Such closed networks have long been considered the most secure technique for protecting data; however, studies have shown that they are no longer effective in providing a safe data protection environment. Research on air-gap attacks remains in its infancy stage. Studies have been conducted to check the method and demonstrate the possibility of transmitting data using various transmission media available within the closed network. These transmission media include optical signals such as HDD LEDs, acoustic signals such as speakers, and the electrical signals of power lines. This paper examines various media used for air-gap attacks by analyzing different techniques and their essential functions, strengths, and limitations. The findings of this survey and the follow-up analysis aim to assist companies and organizations in protecting their information by providing an understanding of air-gap attacks and their current trends.
format Online
Article
Text
id pubmed-10054827
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100548272023-03-30 A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges Park, Jangyong Yoo, Jaehoon Yu, Jaehyun Lee, Jiho Song, JaeSeung Sensors (Basel) Review Major public institutions and organizations that handle sensitive data frequently enforce strong security policies by implementing network separation policies that segregates their internal work networks and internet network using air gaps to prevent the leakage of confidential information. Such closed networks have long been considered the most secure technique for protecting data; however, studies have shown that they are no longer effective in providing a safe data protection environment. Research on air-gap attacks remains in its infancy stage. Studies have been conducted to check the method and demonstrate the possibility of transmitting data using various transmission media available within the closed network. These transmission media include optical signals such as HDD LEDs, acoustic signals such as speakers, and the electrical signals of power lines. This paper examines various media used for air-gap attacks by analyzing different techniques and their essential functions, strengths, and limitations. The findings of this survey and the follow-up analysis aim to assist companies and organizations in protecting their information by providing an understanding of air-gap attacks and their current trends. MDPI 2023-03-17 /pmc/articles/PMC10054827/ /pubmed/36991925 http://dx.doi.org/10.3390/s23063215 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Park, Jangyong
Yoo, Jaehoon
Yu, Jaehyun
Lee, Jiho
Song, JaeSeung
A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges
title A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges
title_full A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges
title_fullStr A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges
title_full_unstemmed A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges
title_short A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges
title_sort survey on air-gap attacks: fundamentals, transport means, attack scenarios and challenges
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10054827/
https://www.ncbi.nlm.nih.gov/pubmed/36991925
http://dx.doi.org/10.3390/s23063215
work_keys_str_mv AT parkjangyong asurveyonairgapattacksfundamentalstransportmeansattackscenariosandchallenges
AT yoojaehoon asurveyonairgapattacksfundamentalstransportmeansattackscenariosandchallenges
AT yujaehyun asurveyonairgapattacksfundamentalstransportmeansattackscenariosandchallenges
AT leejiho asurveyonairgapattacksfundamentalstransportmeansattackscenariosandchallenges
AT songjaeseung asurveyonairgapattacksfundamentalstransportmeansattackscenariosandchallenges
AT parkjangyong surveyonairgapattacksfundamentalstransportmeansattackscenariosandchallenges
AT yoojaehoon surveyonairgapattacksfundamentalstransportmeansattackscenariosandchallenges
AT yujaehyun surveyonairgapattacksfundamentalstransportmeansattackscenariosandchallenges
AT leejiho surveyonairgapattacksfundamentalstransportmeansattackscenariosandchallenges
AT songjaeseung surveyonairgapattacksfundamentalstransportmeansattackscenariosandchallenges