About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Science and Technologies for Smart Cities. 7th EAI International Conference, SmartCity360°, Virtual Event, December 2-4, 2021, Proceedings

Research Article

Low Cost ICS Network Scanning for Vulnerability Prevention

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-06371-8_22,
        author={Robert Foote and Niroop Sugunaraj and Prakash Ranganthan},
        title={Low Cost ICS Network Scanning for Vulnerability Prevention},
        proceedings={Science and Technologies for Smart Cities. 7th EAI International Conference, SmartCity360°, Virtual Event, December 2-4, 2021, Proceedings},
        proceedings_a={SMARTCITY},
        year={2022},
        month={6},
        keywords={Industrial Control Systems (ICS) Information Technology (IT) Nmap Operational Technology (OT) Vulnerability Assessment (VA)},
        doi={10.1007/978-3-031-06371-8_22}
    }
    
  • Robert Foote
    Niroop Sugunaraj
    Prakash Ranganthan
    Year: 2022
    Low Cost ICS Network Scanning for Vulnerability Prevention
    SMARTCITY
    Springer
    DOI: 10.1007/978-3-031-06371-8_22
Robert Foote1, Niroop Sugunaraj2,*, Prakash Ranganthan2
  • 1: Minnkota Power Cooperative, Grand Forks
  • 2: University of North Dakota, Grand Forks
*Contact email: niroop.sugunaraj@und.edu

Abstract

As newer devices are added to operational technology (OT) networks or remote access to them becomes more prevalent, security best practices are increasingly important to reduce vulnerabilities. This paper goes deeper into the tactical level that is lacking in most other regulatory or strategic literature and references NIST where applicable. Targeted audience is that of personnel in the OT network space, looking for a good low cost starting place to enhance security or mitigate vulnerabilities. Layered security through network segregation, vulnerability scanning methods, and firewall use in these specialized systems are explored. Documenting a baseline of a network is covered as the first step to understanding how to secure the network. Insight into ICS-friendly Nmap settings to assist in the host, port, and service discovery to supplement the baseline is provided. Nmap is shown as a viable open-source intrusion detection testing tool for firewalls to ensure a complete vulnerability assessment of the network. The tests documented in this paper are conducted on a small number of power substation devices, the scans ran through Nmap, and all network traffic monitored via Wireshark. Metrics and simple drawings accompany the ideas and suggestions presented in the text to give readers a place to start their own vulnerability mitigation strategies.

Keywords
Industrial Control Systems (ICS) Information Technology (IT) Nmap Operational Technology (OT) Vulnerability Assessment (VA)
Published
2022-06-17
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-06371-8_22
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL