Home > Research > Publications & Outputs > The Forgotten I in IIoT

Electronic data

  • PiVOTScan

    Rights statement: This paper is a postprint of a paper submitted to and accepted for publication in Living in the Internet of Things (IoT 2019) and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library

    Accepted author manuscript, 959 KB, PDF document

Links

Text available via DOI:

View graph of relations

The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things. / Antrobus, Rob; Green, Benjamin; Frey, Sylvain Andre Francis et al.
Living in the Internet of Things 2019. IET, 2019.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Antrobus, R, Green, B, Frey, SAF & Rashid, A 2019, The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things. in Living in the Internet of Things 2019. IET, Living in the Internet of Things 2019, London, United Kingdom, 1/05/19. https://doi.org/10.1049/cp.2019.0126

APA

Antrobus, R., Green, B., Frey, S. A. F., & Rashid, A. (2019). The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things. In Living in the Internet of Things 2019 IET. https://doi.org/10.1049/cp.2019.0126

Vancouver

Antrobus R, Green B, Frey SAF, Rashid A. The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things. In Living in the Internet of Things 2019. IET. 2019 doi: 10.1049/cp.2019.0126

Author

Antrobus, Rob ; Green, Benjamin ; Frey, Sylvain Andre Francis et al. / The Forgotten I in IIoT : A Vulnerability Scanner for Industrial Internet of Things. Living in the Internet of Things 2019. IET, 2019.

Bibtex

@inproceedings{7689d31417db40b1a3463cb43384e323,
title = "The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things",
abstract = "In moving towards highly connected integrated systems, the Industrial Internet of Thing (IIoT) promises a wealth of benefits. Enhanced usage of existing data sources, and integration of additional generation points, provide system users with greater visibility of industrial processes. This visibility can be used to identify and address inefficiencies. Within the context of discrete manufacturing, examples include reduction of waste materials and energy consumption. However, while one becomes engrossed in the use of big-data analytics, cloud technologies, and seamless adoption through hardware gateways, decade old systems are dropped into a technological melting pot of modern IoT, with little consideration of additional cyber security risks. Numerous works have provided evidence to suggest industrial systems are highly vulnerable to cyber attacks, from both a device and communication protocol perspective, yet efforts to automatically identify vulnerabilities are limited. This presents a significant gap, with vulnerability exploitation harbouring potentially life-threatening impact. Here we address this gap through the development of PIVoT Scan, an industrially-aware vulnerability scanner, capable of assessing a diverse range of devices and communication protocols predominantly situated within the legacy layers of IIoT environments — “The forgotten I”. Furthermore, we demonstrate PIVoT Scan{\textquoteright}s ability to outperform a leading vulnerability scanner, Nessus.",
author = "Rob Antrobus and Benjamin Green and Frey, {Sylvain Andre Francis} and Awais Rashid",
note = "This paper is a postprint of a paper submitted to and accepted for publication in Living in the Internet of Things (IoT 2019) and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library ; Living in the Internet of Things 2019, PETRAS'19 ; Conference date: 01-05-2019 Through 02-05-2019",
year = "2019",
month = may,
day = "1",
doi = "10.1049/cp.2019.0126",
language = "English",
isbn = "9781839530890",
booktitle = "Living in the Internet of Things 2019",
publisher = "IET",
url = "https://events2.theiet.org/living-iot/index.cfm?utm_source=redirect&utm_medium=legacyredirects&utm_campaign=2019relaunch",

}

RIS

TY - GEN

T1 - The Forgotten I in IIoT

T2 - Living in the Internet of Things 2019

AU - Antrobus, Rob

AU - Green, Benjamin

AU - Frey, Sylvain Andre Francis

AU - Rashid, Awais

N1 - This paper is a postprint of a paper submitted to and accepted for publication in Living in the Internet of Things (IoT 2019) and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library

PY - 2019/5/1

Y1 - 2019/5/1

N2 - In moving towards highly connected integrated systems, the Industrial Internet of Thing (IIoT) promises a wealth of benefits. Enhanced usage of existing data sources, and integration of additional generation points, provide system users with greater visibility of industrial processes. This visibility can be used to identify and address inefficiencies. Within the context of discrete manufacturing, examples include reduction of waste materials and energy consumption. However, while one becomes engrossed in the use of big-data analytics, cloud technologies, and seamless adoption through hardware gateways, decade old systems are dropped into a technological melting pot of modern IoT, with little consideration of additional cyber security risks. Numerous works have provided evidence to suggest industrial systems are highly vulnerable to cyber attacks, from both a device and communication protocol perspective, yet efforts to automatically identify vulnerabilities are limited. This presents a significant gap, with vulnerability exploitation harbouring potentially life-threatening impact. Here we address this gap through the development of PIVoT Scan, an industrially-aware vulnerability scanner, capable of assessing a diverse range of devices and communication protocols predominantly situated within the legacy layers of IIoT environments — “The forgotten I”. Furthermore, we demonstrate PIVoT Scan’s ability to outperform a leading vulnerability scanner, Nessus.

AB - In moving towards highly connected integrated systems, the Industrial Internet of Thing (IIoT) promises a wealth of benefits. Enhanced usage of existing data sources, and integration of additional generation points, provide system users with greater visibility of industrial processes. This visibility can be used to identify and address inefficiencies. Within the context of discrete manufacturing, examples include reduction of waste materials and energy consumption. However, while one becomes engrossed in the use of big-data analytics, cloud technologies, and seamless adoption through hardware gateways, decade old systems are dropped into a technological melting pot of modern IoT, with little consideration of additional cyber security risks. Numerous works have provided evidence to suggest industrial systems are highly vulnerable to cyber attacks, from both a device and communication protocol perspective, yet efforts to automatically identify vulnerabilities are limited. This presents a significant gap, with vulnerability exploitation harbouring potentially life-threatening impact. Here we address this gap through the development of PIVoT Scan, an industrially-aware vulnerability scanner, capable of assessing a diverse range of devices and communication protocols predominantly situated within the legacy layers of IIoT environments — “The forgotten I”. Furthermore, we demonstrate PIVoT Scan’s ability to outperform a leading vulnerability scanner, Nessus.

U2 - 10.1049/cp.2019.0126

DO - 10.1049/cp.2019.0126

M3 - Conference contribution/Paper

SN - 9781839530890

BT - Living in the Internet of Things 2019

PB - IET

Y2 - 1 May 2019 through 2 May 2019

ER -