1,999 research outputs found

    Uncovering Vulnerable Industrial Control Systems from the Internet Core

    Full text link
    Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.g., DRDoS~attacks). In this paper, we uncover unprotected inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. This traffic analysis is correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We provide an in-depth view on Internet-wide ICS communication. Our results can be used i) to create precise filters for potentially harmful non-industrial ICS traffic, and ii) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks

    Security of internet protocol cameras - A case example

    Get PDF
    The interaction of consumer devices and the internet, especially in relation to security, has always been tenuous. Where it is in the best interests of companies to produce products that are cheap and accessible, these traits often go against that of security. This investigation undertakes an analysis of one such device - the DCS-930L internet protocol camera from D-Link. This camera is analysed for vulnerabilities, with an emphasis on those relating to authentication mechanisms. Several vulnerabilities are identified, and potential attacks based on these are discussed. Solutions or mitigations to these vulnerabilities are presented

    Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

    Full text link
    Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure. Moreover, many embedded systems rely on web interfaces for user interaction or administration. Unfortunately, web security is known to be difficult, and therefore the web interfaces of embedded systems represent a considerable attack surface. In this paper, we present the first fully automated framework that applies dynamic firmware analysis techniques to achieve, in a scalable manner, automated vulnerability discovery within embedded firmware images. We apply our framework to study the security of embedded web interfaces running in Commercial Off-The-Shelf (COTS) embedded devices, such as routers, DSL/cable modems, VoIP phones, IP/CCTV cameras. We introduce a methodology and implement a scalable framework for discovery of vulnerabilities in embedded web interfaces regardless of the vendor, device, or architecture. To achieve this goal, our framework performs full system emulation to achieve the execution of firmware images in a software-only environment, i.e., without involving any physical embedded devices. Then, we analyze the web interfaces within the firmware using both static and dynamic tools. We also present some interesting case-studies, and discuss the main challenges associated with the dynamic analysis of firmware images and their web interfaces and network services. The observations we make in this paper shed light on an important aspect of embedded devices which was not previously studied at a large scale. We validate our framework by testing it on 1925 firmware images from 54 different vendors. We discover important vulnerabilities in 185 firmware images, affecting nearly a quarter of vendors in our dataset. These experimental results demonstrate the effectiveness of our approach

    Improving the National Cyber-security by Finding Vulnerable Industrial Control Systems from the Internet

    Get PDF
    Teollisuusautomaatiojärjestelmiä, joita käytetään muun muassa voimantuotannon, sähkönjakelun ja jätevedenpuhdistuksen järjestelmissä, voidaan löytää julkisesta Internetistä. Tarve etähallinnalle ja keskittämiselle, sekä tuotteiden huono suunnittelu ja virheet järjestelmien käyttöönotossa, ovat altistaneet automaatiojärjestelmiä kenen tahansa ulottuville. Yhteiskunnalle tärkeiden kriittisen infrastruktuuriin kuuluvien järjestelmien turvalliseksi saattaminen on tärkeää kansalliselle kyberturvallisuudelle: ongelmat kriittisessä infrastruktuurissa voivat aiheuttaa voimakkaita häiriöitä eri puolilla yhteiskuntaa. Viime vuosina on havaittu kasvava määrä kyberhyökkäyksiä. Sekä rikolliset, että valtiolliset toimijat kehittävät kyberaseita ja myös teollisuusautomaatiojärjestelmiin on kohdistettu hyökkäyksiä. Vuonna 2010 Stuxnet haittaohjelma onnistui tunkeutumaan iranilaisen ydinpolttoaineenrikastamon järjestelmiin ja aiheuttamaan mittavaa fyysistä tuhoa. Tässä työssä esitellään konsepti, jonka avulla voidaan automaattisesti löytää haavoittuvia teollisuusautomaatiojärjestelmiä, ja raportoida löydökset viranomaisille jatkotoimenpiteitä varten. Työssä esitellään myös prototyyppi, jolla testattiin konseptin toimivuutta oikeilla suomalaisilla järjestelmillä Internetin yli: sormenjälkitietokannan ja porttiskannauksen avulla 2913 IP-osoitteesta löydettiin 91 mahdollista teollisuusautomaatiolaitetta. Epäiltyjä teollisuusautomaatiojärjestelmiä pystytään löytämään Internetistä, mutta löydettyjen järjestelmien kriittisyyden ja tärkeyden arvionti ilman tunkeutumista kohteeseen on vaikeaa. Konseptia tehostaisi huomattavasti automaattinen tietoturva-auditointi, jolla tärkeimmät ja haavoittuvaisimmat kohteet voitaisiin paikallistaa ja poistaa näkyviltä nopeasti. Auditointi ilman järjestelmien omistajien lupaa vaatisi kuitenkin muutoksia lainsäädäntöön.Industrial control systems (ICS), which are used to control critical elements of the society's maintenance such as power generation and electricity distribution, are exposed to the Internet as a result of insecure design, and installation faults. Securing critical industrial systems is important for national cyber-security; malfunctioning elements in the critical infrastructure can quickly cascade into wide range of problems in the society. In the recent years increasing amount of cyber-attacks have been observed, and nations and criminals are developing offensive cyber-capabilities; industrial systems are also targeted as was seen with the Stuxnet-malware in 2010 causing havoc in an Iranian uranium enrichment facility. In this thesis a concept is presented to automatically find and evaluate exposed ICSs and report vulnerable devices to authorities for remediation. A prototype of the concept is built to prove the viability of the concept and to get data from port scanning real ICS devices in the Internet. With the prototype, 91 ICS devices were found out of the assigned 2913 IP addresses. Traffic volume produced by the scanner was insignificant compared to overall Finnish Internet traffic. The concept, called KATSE, is viable but not without challenges: ICS devices can definitely be identified from the Internet but analyzing the actual importance and purpose of the devices is difficult. Currently the Finnish legislation does not allow system intrusions or unauthorized security auditing even by authorities. Automated security auditing for the found devices would be useful to find the most vulnerable devices first but such auditing would require a change in legislation

    PENGARUH MODEL PEMBELAJARAN PEER TEACHING TERHADAP KERJASAMA DAN HASIL BELAJAR KATA BEREGU (HEIAN SHODAN) PADA PEMBELAJARAN KARATE DI SMA NEGERI 1 BALEENDAH

    Get PDF
    Penelitian bertujuan untuk mendapatkan data dan informasi yang jelas mengenai pengaruh model Peer Teaching dalam pembelajaran kata beregu (heian shodan) terhadap kerjasama dan hasil belajar siswa SMA Negeri 1 Baleendah. Karena kerjasama sangat diperlukan dalam menunjang kehidupan bermasyarakat . Begitu pula hasil belajar ingin diketahui melalui penerapan model Peer Teaching. Metode yang digunakan dalam penelitian ini adalah eksperimen dengan pendekatan kuantitatif. Populasi penelitian adalah seluruh siswa kelas X SMA Negeri 1 Baleendah tahun pelajaran 2014/2015 yang mengikuti pembelajaran beladiri karate yang berjumlah 48 siswa. Adapun teknik pengambilan sampel yang digunakan oleh peneliti yaitu teknik sampling jenuh. Desain penelitian yaitu quasi eksperimen dengan pretest-post test control group design. Instrumen yang digunakan dalam penelitian ini yaitu untuk mengukur kerjasama penulis menggunakan angket dengan indicator kerjasama adalah mengikuti aturan, membantu teman yang belum bisa, memotivasi orang lain, hormat pada orang lain, menerima pendapat orang lain, bermain secara terkendali, memperhatikan perasaan orang lain, dan kerjasama meraih tujuan. Sedangkan untuk mengukur hasil belajar kata beregu penulis menggunakan lembar observasi. Berdasarkan hasil perhitungan dan analisis melalui data, maka dapat disimpulkan bahwa : 1. Model Peer Teaching dalam pembelajaran kata beregu (heian shodan) berpengaruh terhadap kerjasama siswa SMA Negeri 1 Baleendah. 2. Model Peer Teaching dalam pembelajaran kata beregu (heian shodan) berpengaruh terhadap hasil belajar siswa SMA Negeri 1 Baleendah. Kata Kunci: Model Peer Teaching, Kerjasama, Hasil Belajar. The research aims to obtain clear data and information on the effect of the Peer Teaching Model in learning ‘KATA team’ (Heian shodan) to students’ cooperation and learning outcomes at SMA Negeri 1 Baleendah. It is because cooperation is really needed to support social life and so does learning outcome through the application of the Peer Teaching model. The method used in this study is an experiment with a quantitative approach. The population of this study was students of class X SMA Negeri 1 Baleendah who follows karate lessons comprising 48 students in the year of 2014/2015. The sampling technique used by the researcher is a saturated sampling technique. The research design is quasi-experimental with pretest - posttest control group design. The instrument that the writer used to measure the cooperation is questionnaire with the following indicators of cooperation; helping a friend who is not capable of, motivating others, respect for others, accepting the other opinions, playing in a controlled way, Paying attention to the feelings of others, and cooperation in reaching the common goal. Meanwhile to measure learning outcomes of ‘Kata Team’, the writer used observation sheet. Based on the data calculations and analysis, it can be concluded that : 1. Peer Teaching Model in learning kata team (Heian shodan) influences students’ cooperation at SMA Negeri 1 Baleendah. 2. Peer Teaching Model in learning Kata Team team (Heian shodan) influences students’ learning outcomes at SMA Negeri 1 Baleendah . Keywords : Peer Teaching Model, Cooperation , Learning Outcomes

    Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation

    Full text link
    Owing to a growing number of attacks, the assessment of Industrial Control Systems (ICSs) has gained in importance. An integral part of an assessment is the creation of a detailed inventory of all connected devices, enabling vulnerability evaluations. For this purpose, scans of networks are crucial. Active scanning, which generates irregular traffic, is a method to get an overview of connected and active devices. Since such additional traffic may lead to an unexpected behavior of devices, active scanning methods should be avoided in critical infrastructure networks. In such cases, passive network monitoring offers an alternative, which is often used in conjunction with complex deep-packet inspection techniques. There are very few publications on lightweight passive scanning methodologies for industrial networks. In this paper, we propose a lightweight passive network monitoring technique using an efficient Media Access Control (MAC) address-based identification of industrial devices. Based on an incomplete set of known MAC address to device associations, the presented method can guess correct device and vendor information. Proving the feasibility of the method, an implementation is also introduced and evaluated regarding its efficiency. The feasibility of predicting a specific device/vendor combination is demonstrated by having similar devices in the database. In our ICS testbed, we reached a host discovery rate of 100% at an identification rate of more than 66%, outperforming the results of existing tools.Comment: http://dx.doi.org/10.14236/ewic/ICS2018.

    Management and Security of IoT systems using Microservices

    Get PDF
    Devices that assist the user with some task or help them to make an informed decision are called smart devices. A network of such devices connected to internet are collectively called as Internet of Things (IoT). The applications of IoT are expanding exponentially and are becoming a part of our day to day lives. The rise of IoT led to new security and management issues. In this project, we propose a solution for some major problems faced by the IoT devices, including the problem of complexity due to heterogeneous platforms and the lack of IoT device monitoring for security and fault tolerance. We aim to solve the above issues in a microservice architecture. We build a data pipeline for IoT devices to send data through a messaging platform Kafka and monitor the devices using the collected data by making real time dashboards and a machine learning model to give better insights of the data. For proof of concept, we test the proposed solution on a heterogeneous cluster, including Raspberry Pi’s and IoT devices from different vendors. We validate our design by presenting some simple experimental results
    corecore