Abstract
As newer devices are added to operational technology (OT) networks or remote access to them becomes more prevalent, security best practices are increasingly important to reduce vulnerabilities. This paper goes deeper into the tactical level that is lacking in most other regulatory or strategic literature and references NIST where applicable. Targeted audience is that of personnel in the OT network space, looking for a good low cost starting place to enhance security or mitigate vulnerabilities. Layered security through network segregation, vulnerability scanning methods, and firewall use in these specialized systems are explored. Documenting a baseline of a network is covered as the first step to understanding how to secure the network. Insight into ICS-friendly Nmap settings to assist in the host, port, and service discovery to supplement the baseline is provided. Nmap is shown as a viable open-source intrusion detection testing tool for firewalls to ensure a complete vulnerability assessment of the network. The tests documented in this paper are conducted on a small number of power substation devices, the scans ran through Nmap, and all network traffic monitored via Wireshark. Metrics and simple drawings accompany the ideas and suggestions presented in the text to give readers a place to start their own vulnerability mitigation strategies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alsumayt, A., Haggerty, J.: Using trust based method to detect DoS attack in MANETs. The Convergence of Networking, Broadcasting, and Telecommunications, UK, PGNet (2014)
Anderson, D., Kipp, N.: Implementing firewalls for modern substation cybersecurity. In: Proceedings of the 12th Annual Western Power Delivery Automation Conference, Spokane, WA (2010)
Ceron, J., Chromik, J., Cardoso de Santanna, J., Pras, A.: Online discoverability and vulnerabilities of ICS/SCADA devices in the Netherlands. University of Twente, Netherlands (2019). In opdracht van het Wetenschappelijk Onderzoek en Documentatiecentrum (WODC)
Chalamasetty, G.K., Mandal, P., Tseng, T.L.: Secure SCADA communication network for detecting and preventing cyber-attacks on power systems. In: 2016 Clemson University Power Systems Conference (PSC), pp. 1–7. IEEE (2016)
Coffey, K., Smith, R., Maglaras, L., Janicke, H.: Vulnerability analysis of network scanning on SCADA systems. Secur. Commun. Netw. (2018)
Duggan, D., Berg, M., Dillinger, J., Stamp, J.: Penetration testing of industrial control systems. Sandia National Laboratories (2005)
Graham, J., Hieb, J., Naber, J.: Improving cybersecurity for industrial control systems. In: 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE), pp. 618–623. IEEE (2016)
Gray, C.: How SDN can improve cybersecurity in OT networks. In: 22nd Conference of the Electric Power Supply Industry, September 2018
Department of Homeland Security, C.f.P.o.N.I.: Configuring and managing remote access for industrial control systems, November 2010
Hurd, C.M., McCarty, M.V.: A survey of security tools for the industrial control system environment. Technical report, Idaho National Lab. (INL), Idaho Falls, ID, USA (2017)
for Internet Security, C.: Cybersecurity spotlight - defense in depth (DiD), January 2021
Kalbfleisch, D.J.: SCADA technologies and vulnerabilities, May 2013
Kavanagh, K., Bussa, T., Sadowski, G.: Magic quadrant for security information and event management. Technical report, Gartner (2020)
Keene, M.: The risks of an it versus OT paradigm. SANS ICS, July 2019
Manson, S., Anderson, D.: Practical cybersecurity for protection and control system communications networks. In: 2017 Petroleum and Chemical Industry Technical Conference (PCIC), pp. 195–204. IEEE (2017)
Mustard, S.: Security of distributed control systems: the concern increases. Comput. Control Eng. J. 16(6), 19–25 (2006)
Newton, P.: SCADA/ICS dangers & cybersecurity strategies, April 2020. https://www.darkreading.com/endpoint/scada-ics-dangers-and-cybersecurity-strategies/a/d-id/1332278
Nmap.org: Nmap reference guide | Nmap network scanning, April 2018
Peterson, D.: Quickdraw: generating security log events for legacy SCADA and control system devices. In: 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp. 227–229. IEEE (2009)
Samdarshi, R., Sinha, N., Tripathi, P.: A triple layer intrusion detection system for SCADA security of electric utility. In: 2015 Annual IEEE India Conference (INDICON), pp. 1–5. IEEE (2015)
Scarfone, K., Souppaya, M., Cody, A., Orebaugh, A.: Technical Guide to Information Security Testing and Assessment, vol. 800, no. 115, pp. 2–25. NIST Special Publication (2008)
Shodhan: Shodhan ICS radar (2020)
Slay, J., Miller, M.: A security architecture for SCADA networks. In: ACIS 2006 Proceedings, p. 12 (2006)
of Standards, N.I., (NIST), T.: Framework for improving critical infrastructure cybersecurity, ver 1.1. NIST Cybersecurity Framework (2018)
Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) Security, vol. 800, no. 82. NIST Special Publication (2011)
Tian, Z., Wu, W., Li, S., Li, X., Sun, Y., Chen, Z.: A security model of SCADA system based on attack tree. In: 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2), pp. 2653–2658. IEEE (2019)
Acknowledgment
The authors would like to acknowledge the support from Dr. William Souza, Professor at the University of North Dakota (UND) for his guidance and feedback in improving and revising the manuscript.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Foote, R., Sugunaraj, N., Ranganthan, P. (2022). Low Cost ICS Network Scanning for Vulnerability Prevention. In: Paiva, S., et al. Science and Technologies for Smart Cities. SmartCity 360 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 442. Springer, Cham. https://doi.org/10.1007/978-3-031-06371-8_22
Download citation
DOI: https://doi.org/10.1007/978-3-031-06371-8_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06370-1
Online ISBN: 978-3-031-06371-8
eBook Packages: Computer ScienceComputer Science (R0)