43 
obfuscate  malicious  behavior  primarily  in  the 
displayed information to finally decoy the navigator. 
However,  there  are  other  environments  in  which 
visual  obfuscation  is  of  minor  importance. 
Autonomous  surface  or  underwater  vehicles  are 
designed  to  operate  mostly  unmanned,  eliminating 
the need and the opportunity for human validation. In 
consequence, incoming sensor data has an automated 
impact  on  how  onboard  actuators  are  controlled, 
which  increases  not  only  the  likelihood  but  also  the 
possible  damage  of  a  successful  cyber  attack  on  the 
maritime system. 
7  CONCLUSION 
In  this  paper,  we  extended  the  current  threat 
landscape  of  maritime  systems  by  internal  cyber 
attacks against integrated  bridge  systems, which  aim 
to  tamper  with  the  communication  of  nautical  data 
and  are  usually  neglected  in  existing  cyber  risk 
assessments.  Moreover,  we  introduced  a  BRidge 
Attack  Tool  (BRAT)  that,  to  the  best  of  our 
knowledge, is the first maritime-specific security tool 
that enables the interactive launch of numerous PitM 
and  PotS  cyber  attacks.  BRAT  supports  various 
common  network  attack  features,  including  packet 
capturing,  replay,  and  injection  attacks  along  with 
classical  identity  spoofing.  It  can  be  deployed  in 
common  development  environments  which 
implement  (simulated)  sources  for  nautical  data  and 
are  compatible  to  LWE.  Thus,  it  greatly  supports 
existing  processes  to  technically  assess,  prevent,  and 
detect  cyber  attacks  on  maritime  systems  by  using 
offensive  security  methods.  In  addition,  Maritime 
Education  and  Training  can  benefit  from  BRAT  as 
navigators can be trained to adequately react to cyber 
attacks  in  realistic  scenarios.  By  using  BRAT,  we 
further  demonstrated  how  internal  cyber  attacks  can 
violate  the  availability  and  integrity  of  common 
onboard  systems  and  exemplarily  highlighted  their 
impacts  with  regard  to  AIS  and  GNSS  attacks 
targeting an ECDIS. 
As  part  of  our  future  work,  we  plan  to  extend 
BRAT’s  range  of  applications  to  support  further 
maritime  system  interfaces  for  radar  images,  chart 
updates, and automation control. Also, we will widen 
the  context  to  investigate  cyber  attacks  on 
autonomous systems. 
REFERENCES 
1.  Awan,  M.S.,  Al  Ghamdi,  M.A.:  Understanding  the 
Vulnerabilities  in  Digital  Components  of  an  Integrated 
Bridge  System  (IBS).  Journal  of  Marine  Science  and 
Engineering.  7,  10,  (2019). 
https://doi.org/10.3390/jmse7100350. 
2.  Aziz,  A.,  Tedeschi,  P.,  Sciancalepore,  S.,  Pietro,  R.D.: 
SecureAIS - Securing Pairwise Vessels Communications. 
In:  2020  IEEE  Conference  on  Communications  and 
Network  Security  (CNS).  pp.  1–9  (2020). 
https://doi.org/10.1109/CNS48642.2020.9162320. 
3.  Balduzzi,  M.,  Pasta,  A.,  Wilhoit,  K.:  A  Security 
Evaluation of AIS Automated Identification System. In: 
Proceedings  of  the  30th  Annual  Computer  Security 
Applications  Conference.  pp.  436–445  Association  for 
Computing  Machinery,  New  York,  NY,  USA  (2014). 
https://doi.org/10.1145/2664243.2664257. 
4.  Bhatti, J., Humphreys, T.E.: Hostile Control of Ships via 
False  GPS  Signals:  Demonstration  and  Detection. 
Navigation.  64,  1,  51–66  (2017). 
https://doi.org/10.1002/navi.183. 
5.  Bimco:  The  Guidelines  on  Cyber  Security  Onboard 
Ships,  https://www.bimco.org/about-us-and-our-
members/publications/the-guidelines-on-cyber-security-
onboard-ships, last accessed 2021/04/19. 
6.  BSI:  IT-Grundschutz  Profile  for  Shipping  Companies  - 
Minimum  Protection  for  Ship  Operations, 
https://www.bsi.bund.de/SharedDocs/Downloads/EN/B
SI/Grundschutz/profiles/Profile_for_Shipping_Compani
es_Minimum_Protection_for_Ship_Operations.pdf,  last 
accessed 2021/04/19. 
7.  ENISA:  Cyber  security  aspects  in  the  maritime  sector, 
https://www.enisa.europa.eu/publications/cyber-
security-aspects-in-the-maritime-sector-1,  last  accessed 
2021/04/19. 
8.  Felderer, M., Büchler, M., Johns, M., Brucker, A.D., Breu, 
R.,  Pretschner,  A.:  Chapter  One  -  Security  Testing:  A 
Survey. In: Memon, A. (ed.) Advances in Computers. pp. 
1–51  Elsevier  (2016). 
https://doi.org/10.1016/bs.adcom.2015.11.003. 
9.  Goudosis,  A.,  Katsikas,  S.:  Secure  AIS  with  Identity-
Based  Authentication  and  Encryption.  TransNav,  the 
International  Journal  on  Marine  Navigation and  Safety 
of  Sea  Transportation.  14,  2,  287–298  (2020). 
https://doi.org/10.12716/1001.14.02.03. 
10. Hassani,  V.,  Crasta,  N.,  Pascoal,  A.M.:  Cyber  Security 
Issues in Navigation Systems of Marine Vessels From a 
Control Perspective. In: OMAE2017. , Volume 7B: Ocean 
Engineering  (2017).  https://doi.org/10.1115/OMAE2017-
61771. 
11. Heering,  D.:  Ensuring  Cybersecurity  in  Shipping: 
Reference  to  Estonian  Shipowners.  TransNav,  the 
International  Journal  on  Marine  Navigation and  Safety 
of  Sea  Transportation.  14,  2,  271–278  (2020). 
https://doi.org/10.12716/1001.14.02.01. 
12. Heering,  D.,  Maennel,  O.M.,  Venables,  O.M.: 
Shortcomings  in  cybersecurity  education  for  seafarers. 
Presented  at  the  5th  International  Conference  on 
Maritime  Technology  and  Engineering  ,  Lisbon, 
Portugal (2020). 
13. Hemminghaus,  C.,  Bauer,  J.,  Wolsing,  K.:  SIGMAR: 
Ensuring  Integrity  and  Authenticity  of  Maritime 
Systems  using  Digital  Signatures.  Presented  at  the 
ISNCC-TSP (2021). 
14. Huang,  T.,  Zhou,  J., Bytes,  A.:  ATG:  An  Attack  Traffic 
Generation Tool for Security Testing of In-Vehicle CAN 
Bus. In: Proceedings of the 13th International Conference 
on Availability, Reliability and Security. Association for 
Computing  Machinery,  New  York,  NY,  USA  (2018). 
https://doi.org/10.1145/3230833.3230843. 
15. IEC 61162-450:2018:  Maritime  navigation  and 
radiocommunication  equipment  and  systems  –  Digital 
interfaces  –  Part  450:  Multiple  talkers  and  multiple 
listeners – Ethernet interconnection. (2018). 
16. IEC 61162-460:2018:  Maritime  navigation  and 
radiocommunication  equipment  and  systems  –  Digital 
interfaces  –  Part  460:  Multiple  talkers  and  multiple 
listeners  –  Ethernet  interconnection  –  Safety  and 
Security. (2018). 
17. International  Maritime  Organization:  Guidelines  on 
Maritime  Cyber  Risk  Management  MSC-FAL.1/Circ.3., 
https://www.imo.org/en/OurWork/Security/Pages/Cyber
-security.aspx, last accessed 2021/04/19. 
18. Kessler,  G.C.:  Protected  AIS:  A  Demonstration  of 
Capability  Scheme  to  Provide  Authentication  and 
Message  Integrity.  TransNav,  the  International  Journal 
on Marine Navigation and Safety of Sea Transportation. 
14,  2,  279–286  (2020). 
https://doi.org/10.12716/1001.14.02.02.