迈向工业物联网网络中漏洞和利用识别的自动化

Nour Moustafa, B. Turnbull, Kim-Kwang Raymond Choo
{"title":"迈向工业物联网网络中漏洞和利用识别的自动化","authors":"Nour Moustafa, B. Turnbull, Kim-Kwang Raymond Choo","doi":"10.1109/ICII.2018.00023","DOIUrl":null,"url":null,"abstract":"Since Industrial Internet of Things (IIoT) networks are comprised of heterogeneous manufacturing and technological devices and services, discovering previously unknown vulnerabilities and their exploitation vectors (also known as Penetration Testing - PT) is an arduous and risk-prone process. PT across IIoT networks requires system administrators to attempt multiple and often bespoke commercial tools for testing vulnerable network nodes, platforms, and software. In this paper, we propose a new testbed IIoT environment involving multiple vulnerable platforms connected to IIoT sensors and IoT gateways for designing automated vulnerability and exploitation identification techniques based on analyzing network flows. We utilize a particle filter technique for estimating the vulnerability and exploitation behaviors in a term of posterior probabilities. The proposed model is better than using traditional artificial planning algorithms that consume significant computational resources and demand termination criteria. The proposed testbed IIoT environment can be shared with other like-minded researchers to facilitate future evaluations.","PeriodicalId":330919,"journal":{"name":"2018 IEEE International Conference on Industrial Internet (ICII)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks\",\"authors\":\"Nour Moustafa, B. Turnbull, Kim-Kwang Raymond Choo\",\"doi\":\"10.1109/ICII.2018.00023\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since Industrial Internet of Things (IIoT) networks are comprised of heterogeneous manufacturing and technological devices and services, discovering previously unknown vulnerabilities and their exploitation vectors (also known as Penetration Testing - PT) is an arduous and risk-prone process. PT across IIoT networks requires system administrators to attempt multiple and often bespoke commercial tools for testing vulnerable network nodes, platforms, and software. In this paper, we propose a new testbed IIoT environment involving multiple vulnerable platforms connected to IIoT sensors and IoT gateways for designing automated vulnerability and exploitation identification techniques based on analyzing network flows. We utilize a particle filter technique for estimating the vulnerability and exploitation behaviors in a term of posterior probabilities. The proposed model is better than using traditional artificial planning algorithms that consume significant computational resources and demand termination criteria. The proposed testbed IIoT environment can be shared with other like-minded researchers to facilitate future evaluations.\",\"PeriodicalId\":330919,\"journal\":{\"name\":\"2018 IEEE International Conference on Industrial Internet (ICII)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on Industrial Internet (ICII)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICII.2018.00023\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Industrial Internet (ICII)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICII.2018.00023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

由于工业物联网(IIoT)网络由异构制造和技术设备和服务组成,发现以前未知的漏洞及其利用向量(也称为渗透测试- PT)是一个艰巨且容易发生风险的过程。跨IIoT网络的PT需要系统管理员尝试多个(通常是定制的)商业工具来测试易受攻击的网络节点、平台和软件。在本文中,我们提出了一个新的测试平台IIoT环境,涉及连接到IIoT传感器和IoT网关的多个脆弱平台,用于设计基于分析网络流的自动化漏洞和利用识别技术。我们利用粒子滤波技术估计后验概率下的脆弱性和利用行为。该模型优于传统的人工规划算法,传统的人工规划算法消耗大量的计算资源和需求终止准则。提议的测试平台IIoT环境可以与其他志同道合的研究人员共享,以促进未来的评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks
Since Industrial Internet of Things (IIoT) networks are comprised of heterogeneous manufacturing and technological devices and services, discovering previously unknown vulnerabilities and their exploitation vectors (also known as Penetration Testing - PT) is an arduous and risk-prone process. PT across IIoT networks requires system administrators to attempt multiple and often bespoke commercial tools for testing vulnerable network nodes, platforms, and software. In this paper, we propose a new testbed IIoT environment involving multiple vulnerable platforms connected to IIoT sensors and IoT gateways for designing automated vulnerability and exploitation identification techniques based on analyzing network flows. We utilize a particle filter technique for estimating the vulnerability and exploitation behaviors in a term of posterior probabilities. The proposed model is better than using traditional artificial planning algorithms that consume significant computational resources and demand termination criteria. The proposed testbed IIoT environment can be shared with other like-minded researchers to facilitate future evaluations.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信