Skip to main content

Low Cost ICS Network Scanning for Vulnerability Prevention

  • Conference paper
  • First Online:
Science and Technologies for Smart Cities (SmartCity 360 2021)

Abstract

As newer devices are added to operational technology (OT) networks or remote access to them becomes more prevalent, security best practices are increasingly important to reduce vulnerabilities. This paper goes deeper into the tactical level that is lacking in most other regulatory or strategic literature and references NIST where applicable. Targeted audience is that of personnel in the OT network space, looking for a good low cost starting place to enhance security or mitigate vulnerabilities. Layered security through network segregation, vulnerability scanning methods, and firewall use in these specialized systems are explored. Documenting a baseline of a network is covered as the first step to understanding how to secure the network. Insight into ICS-friendly Nmap settings to assist in the host, port, and service discovery to supplement the baseline is provided. Nmap is shown as a viable open-source intrusion detection testing tool for firewalls to ensure a complete vulnerability assessment of the network. The tests documented in this paper are conducted on a small number of power substation devices, the scans ran through Nmap, and all network traffic monitored via Wireshark. Metrics and simple drawings accompany the ideas and suggestions presented in the text to give readers a place to start their own vulnerability mitigation strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alsumayt, A., Haggerty, J.: Using trust based method to detect DoS attack in MANETs. The Convergence of Networking, Broadcasting, and Telecommunications, UK, PGNet (2014)

    Google Scholar 

  2. Anderson, D., Kipp, N.: Implementing firewalls for modern substation cybersecurity. In: Proceedings of the 12th Annual Western Power Delivery Automation Conference, Spokane, WA (2010)

    Google Scholar 

  3. Ceron, J., Chromik, J., Cardoso de Santanna, J., Pras, A.: Online discoverability and vulnerabilities of ICS/SCADA devices in the Netherlands. University of Twente, Netherlands (2019). In opdracht van het Wetenschappelijk Onderzoek en Documentatiecentrum (WODC)

    Google Scholar 

  4. Chalamasetty, G.K., Mandal, P., Tseng, T.L.: Secure SCADA communication network for detecting and preventing cyber-attacks on power systems. In: 2016 Clemson University Power Systems Conference (PSC), pp. 1–7. IEEE (2016)

    Google Scholar 

  5. Coffey, K., Smith, R., Maglaras, L., Janicke, H.: Vulnerability analysis of network scanning on SCADA systems. Secur. Commun. Netw. (2018)

    Google Scholar 

  6. Duggan, D., Berg, M., Dillinger, J., Stamp, J.: Penetration testing of industrial control systems. Sandia National Laboratories (2005)

    Google Scholar 

  7. Graham, J., Hieb, J., Naber, J.: Improving cybersecurity for industrial control systems. In: 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE), pp. 618–623. IEEE (2016)

    Google Scholar 

  8. Gray, C.: How SDN can improve cybersecurity in OT networks. In: 22nd Conference of the Electric Power Supply Industry, September 2018

    Google Scholar 

  9. Department of Homeland Security, C.f.P.o.N.I.: Configuring and managing remote access for industrial control systems, November 2010

    Google Scholar 

  10. Hurd, C.M., McCarty, M.V.: A survey of security tools for the industrial control system environment. Technical report, Idaho National Lab. (INL), Idaho Falls, ID, USA (2017)

    Google Scholar 

  11. for Internet Security, C.: Cybersecurity spotlight - defense in depth (DiD), January 2021

    Google Scholar 

  12. Kalbfleisch, D.J.: SCADA technologies and vulnerabilities, May 2013

    Google Scholar 

  13. Kavanagh, K., Bussa, T., Sadowski, G.: Magic quadrant for security information and event management. Technical report, Gartner (2020)

    Google Scholar 

  14. Keene, M.: The risks of an it versus OT paradigm. SANS ICS, July 2019

    Google Scholar 

  15. Manson, S., Anderson, D.: Practical cybersecurity for protection and control system communications networks. In: 2017 Petroleum and Chemical Industry Technical Conference (PCIC), pp. 195–204. IEEE (2017)

    Google Scholar 

  16. Mustard, S.: Security of distributed control systems: the concern increases. Comput. Control Eng. J. 16(6), 19–25 (2006)

    Article  Google Scholar 

  17. Newton, P.: SCADA/ICS dangers & cybersecurity strategies, April 2020. https://www.darkreading.com/endpoint/scada-ics-dangers-and-cybersecurity-strategies/a/d-id/1332278

  18. Nmap.org: Nmap reference guide | Nmap network scanning, April 2018

    Google Scholar 

  19. Peterson, D.: Quickdraw: generating security log events for legacy SCADA and control system devices. In: 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp. 227–229. IEEE (2009)

    Google Scholar 

  20. Samdarshi, R., Sinha, N., Tripathi, P.: A triple layer intrusion detection system for SCADA security of electric utility. In: 2015 Annual IEEE India Conference (INDICON), pp. 1–5. IEEE (2015)

    Google Scholar 

  21. Scarfone, K., Souppaya, M., Cody, A., Orebaugh, A.: Technical Guide to Information Security Testing and Assessment, vol. 800, no. 115, pp. 2–25. NIST Special Publication (2008)

    Google Scholar 

  22. Shodhan: Shodhan ICS radar (2020)

    Google Scholar 

  23. Slay, J., Miller, M.: A security architecture for SCADA networks. In: ACIS 2006 Proceedings, p. 12 (2006)

    Google Scholar 

  24. of Standards, N.I., (NIST), T.: Framework for improving critical infrastructure cybersecurity, ver 1.1. NIST Cybersecurity Framework (2018)

    Google Scholar 

  25. Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) Security, vol. 800, no. 82. NIST Special Publication (2011)

    Google Scholar 

  26. Tian, Z., Wu, W., Li, S., Li, X., Sun, Y., Chen, Z.: A security model of SCADA system based on attack tree. In: 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2), pp. 2653–2658. IEEE (2019)

    Google Scholar 

Download references

Acknowledgment

The authors would like to acknowledge the support from Dr. William Souza, Professor at the University of North Dakota (UND) for his guidance and feedback in improving and revising the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Niroop Sugunaraj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Foote, R., Sugunaraj, N., Ranganthan, P. (2022). Low Cost ICS Network Scanning for Vulnerability Prevention. In: Paiva, S., et al. Science and Technologies for Smart Cities. SmartCity 360 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 442. Springer, Cham. https://doi.org/10.1007/978-3-031-06371-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06371-8_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06370-1

  • Online ISBN: 978-3-031-06371-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics