Nour Moustafa, B. Turnbull, Kim-Kwang Raymond Choo
{"title":"迈向工业物联网网络中漏洞和利用识别的自动化","authors":"Nour Moustafa, B. Turnbull, Kim-Kwang Raymond Choo","doi":"10.1109/ICII.2018.00023","DOIUrl":null,"url":null,"abstract":"Since Industrial Internet of Things (IIoT) networks are comprised of heterogeneous manufacturing and technological devices and services, discovering previously unknown vulnerabilities and their exploitation vectors (also known as Penetration Testing - PT) is an arduous and risk-prone process. PT across IIoT networks requires system administrators to attempt multiple and often bespoke commercial tools for testing vulnerable network nodes, platforms, and software. In this paper, we propose a new testbed IIoT environment involving multiple vulnerable platforms connected to IIoT sensors and IoT gateways for designing automated vulnerability and exploitation identification techniques based on analyzing network flows. We utilize a particle filter technique for estimating the vulnerability and exploitation behaviors in a term of posterior probabilities. The proposed model is better than using traditional artificial planning algorithms that consume significant computational resources and demand termination criteria. The proposed testbed IIoT environment can be shared with other like-minded researchers to facilitate future evaluations.","PeriodicalId":330919,"journal":{"name":"2018 IEEE International Conference on Industrial Internet (ICII)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks\",\"authors\":\"Nour Moustafa, B. Turnbull, Kim-Kwang Raymond Choo\",\"doi\":\"10.1109/ICII.2018.00023\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since Industrial Internet of Things (IIoT) networks are comprised of heterogeneous manufacturing and technological devices and services, discovering previously unknown vulnerabilities and their exploitation vectors (also known as Penetration Testing - PT) is an arduous and risk-prone process. PT across IIoT networks requires system administrators to attempt multiple and often bespoke commercial tools for testing vulnerable network nodes, platforms, and software. In this paper, we propose a new testbed IIoT environment involving multiple vulnerable platforms connected to IIoT sensors and IoT gateways for designing automated vulnerability and exploitation identification techniques based on analyzing network flows. We utilize a particle filter technique for estimating the vulnerability and exploitation behaviors in a term of posterior probabilities. The proposed model is better than using traditional artificial planning algorithms that consume significant computational resources and demand termination criteria. The proposed testbed IIoT environment can be shared with other like-minded researchers to facilitate future evaluations.\",\"PeriodicalId\":330919,\"journal\":{\"name\":\"2018 IEEE International Conference on Industrial Internet (ICII)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on Industrial Internet (ICII)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICII.2018.00023\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Industrial Internet (ICII)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICII.2018.00023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks
Since Industrial Internet of Things (IIoT) networks are comprised of heterogeneous manufacturing and technological devices and services, discovering previously unknown vulnerabilities and their exploitation vectors (also known as Penetration Testing - PT) is an arduous and risk-prone process. PT across IIoT networks requires system administrators to attempt multiple and often bespoke commercial tools for testing vulnerable network nodes, platforms, and software. In this paper, we propose a new testbed IIoT environment involving multiple vulnerable platforms connected to IIoT sensors and IoT gateways for designing automated vulnerability and exploitation identification techniques based on analyzing network flows. We utilize a particle filter technique for estimating the vulnerability and exploitation behaviors in a term of posterior probabilities. The proposed model is better than using traditional artificial planning algorithms that consume significant computational resources and demand termination criteria. The proposed testbed IIoT environment can be shared with other like-minded researchers to facilitate future evaluations.