首页> 外文会议>International Conference on Living in the Internet of Things >The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things
【24h】

The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things

机译:IIT中忘记的我:工业互联网的漏洞扫描仪

获取原文

摘要

In moving towards highly connected integrated systems, the Industrial Internet of Thing (IIoT) promises a wealth of benefits. Enhanced usage of existing data sources, and integration of additional generation points, provide system users with greater visibility of industrial processes. This visibility can be used to identify and address inefficiencies. Within the context of discrete manufacturing, examples include reduction of waste materials and energy consumption. However, while one becomes engrossed in the use of big-data analytics, cloud technologies, and seamless adoption through hardware gateways, decade old systems are dropped into a technological melting pot of modern IoT, with little consideration of additional cyber security risks. Numerous works have provided evidence to suggest industrial systems are highly vulnerable to cyber attacks, from both a device and communication protocol perspective, yet efforts to automatically identify vulnerabilities are limited. This presents a significant gap, with vulnerability exploitation harbouring potentially life-threatening impact. Here we address this gap through the development of PIVoT Scan, an industrially-aware vulnerability scanner, capable of assessing a diverse range of devices and communication protocols predominantly situated within the legacy layers of IIoT environments - "The forgotten I". Furthermore, we demonstrate PIVoT Scan's ability to outperform a leading vulnerability scanner, Nessus.
机译:在转向高度连接的集成系统时,工业的物质(IIT)承诺丰富的福利。增强使用现有数据源的使用以及额外的生成点的集成,为系统用户提供了具有更高的工业过程可见度的系统用户。这种可视性可用于识别和解决效率低下。在离散制造的背景下,实例包括减少废料和能量消耗。然而,虽然在使用大数据分析,云技术和通过硬件网关的使用中陷入困境,但十年的旧系统被丢弃到现代物联网的技术熔化罐中,几乎没有考虑额外的网络安全风险。众多作品已经提供了证据,提出工业系统高度容易受到网络攻击的影响,从设备和通信协议的角度来看,自动识别漏洞的努力是有限的。这提出了一个重要的差距,漏洞剥削潜在的危及生命的影响。在这里,我们通过开发枢轴扫描,这是一种工业意识的漏洞扫描仪的发展,能够评估主要位于IIOT环境的传统层内的各种设备和通信协议 - “遗忘I”。此外,我们展示了Pivot Scan胜过领先的漏洞扫描仪Nessus的能力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号