The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things

Rob Antrobus, Benjamin Green, Sylvain Frey, Awais Rashid

Research output: Contribution to conferenceConference Paperpeer-review

105 Downloads (Pure)

Abstract

In moving towards highly connected integrated systems, the Industrial Internet of Thing (IIoT) promises a wealth of ben- efits. Enhanced usage of existing data sources, and integration of additional generation points, provide system users with greater visibility of industrial processes. This visibility can be used to identify and address inefficiencies. Within the context of discrete manufacturing, examples include reduction of waste materials and energy consumption. However, while one becomes engrossed in the use of big-data analytics, cloud technologies, and seamless adoption through hardware gateways, decade old systems are dropped into a technological melting pot of modern IoT, with little consideration of additional cyber security risks. Numerous works have provided evidence to suggest industrial systems are highly vulnerable to cyber attacks, from both a device and communication protocol perspective, yet efforts to automatically identify vulnerabilities are limited. This presents a significant gap, with vulnerability exploitation harbouring potentially life-threatening impact. Here we address this gap through the development of PIVoT Scan, an industrially-aware vulnerability scanner, capable of assessing a diverse range of devices and communication protocols predominantly situated within the legacy layers of IIoT environments — “The forgotten I”. Furthermore, we demonstrate PIVoT Scan’s ability to outperform a leading vulnerability scanner, Nessus.
Original languageEnglish
Number of pages8
Publication statusAccepted/In press - 17 Jan 2019
EventLiving in the Internet of Things - London, United Kingdom
Duration: 1 May 20192 May 2019
https://events.theiet.org/living-iot/scope.cfm/event-email

Conference

ConferenceLiving in the Internet of Things
CountryUnited Kingdom
CityLondon
Period1/05/192/05/19
Internet address

Structured keywords

  • Cyber Security

Keywords

  • security vulnerabilities
  • industrial control systems
  • cyber-physical systems
  • industrial IoT
  • Programmable logic controllers

Fingerprint Dive into the research topics of 'The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things'. Together they form a unique fingerprint.

Cite this