当前位置: X-MOL 学术Cluster Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Vulnerability assessment of industrial systems using Shodan
Cluster Computing ( IF 3.6 ) Pub Date : 2021-06-08 , DOI: 10.1007/s10586-021-03330-3
Izzat Alsmadi , Zyad Dwekat , Ricardo Cantu , Bilal Al-Ahmad

The Internet, and many of the related things, hence the term Internet of Things, IoT, continue to expand and take more roles in human lives. Indeed, this enables us to be connected with our devices and the environment. The Internet also enabled us to be continuously informed about the status of our cars, homes, health, family, friends, etc. However, such exposure or publicity for all those things around us risks them being accessed and used by illegitimate users or intruders. In recent years, Industrial Control Systems (ICSs) have been exposed to the public Internet after being traditionally existed in closed communication systems. As a result, there is a critical need to shed light on network security concerns for these systems' safety. Our study evaluates the different communication protocols used in these systems and assesses and analyzes their security vulnerabilities. The results showed no significant correlation between the number of open ports and total recorded vulnerabilities. Results also showed that specific ports are more vulnerable than the rest due to the nature of their services or applications.



中文翻译:

使用 Shodan 对工业系统进行漏洞评估

互联网和许多相关事物,因此称为物联网,IoT,不断扩展并在人类生活中扮演更多角色。事实上,这使我们能够与我们的设备和环境建立联系。互联网还使我们能够不断地了解我们的汽车、房屋、健康、家人、朋友等的状态。但是,对我们周围所有事物的这种曝光或宣传存在风险它们被非法用户或入侵者访问和使用。近年来,工业控制系统(ICS)在传统上存在于封闭的通信系统中后,已经暴露在公共互联网上。因此,迫切需要阐明这些系统安全的网络安全问题。我们的研究评估了这些系统中使用的不同通信协议,并评估和分析了它们的安全漏洞。结果表明,开放端口的数量与记录的漏洞总数之间没有显着相关性。结果还表明,由于其服务或应用程序的性质,特定端口比其他端口更容易受到攻击。

更新日期:2021-06-09
down
wechat
bug