Network Scanning and Mapping for IIoT Edge Node Device Security

10/16/2019
by   Matthias Niedermaier, et al.
0

The amount of connected devices in the industrial environment is growing continuously, due to the ongoing demands of new features like predictive maintenance. New business models require more data, collected by IIoT edge node sensors based on inexpensive and low performance Microcontroller Units (MCUs). A negative side effect of this rise of interconnections is the increased attack surface, enabled by a larger network with more network services. Attaching badly documented and cheap devices to industrial networks often without permission of the administrator even further increases the security risk. A decent method to monitor the network and detect "unwanted" devices is network scanning. Typically, this scanning procedure is executed by a computer or server in each sub-network. In this paper, we introduce network scanning and mapping as a building block to scan directly from the Industrial Internet of Things (IIoT) edge node devices. This module scans the network in a pseudo-random periodic manner to discover devices and detect changes in the network structure. Furthermore, we validate our approach in an industrial testbed to show the feasibility of this approach.

READ FULL TEXT

page 5

page 6

page 7

research
08/11/2019

Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices

Communication between sensors, actors and Programmable Logic Controllers...
research
04/08/2019

Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation

Owing to a growing number of attacks, the assessment of Industrial Contr...
research
02/03/2022

A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools

Asset scanning and discovery is the first and foremost step for organiza...
research
02/16/2023

Signaling Storm Detection in IIoT Network based on the Open RAN Architecture

The Industrial Internet of Things devices due to their low cost and comp...
research
04/25/2018

Der Trusted Connector im Industrial Data Space

Digitalization affects all industrial domains and causes disruption of v...
research
09/27/2020

Addressless: A New Internet Server Model to Prevent Network Scanning

Eliminating unnecessary exposure is a principle of server security. The ...
research
04/05/2018

A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT

Cloud-assisted Cognitive Internet of Things has powerful data analytics ...

Please sign up or login with your details

Forgot password? Click here to reset