Modular Vulnerability Indication for the IoT in IP-Based Networks
Title | Modular Vulnerability Indication for the IoT in IP-Based Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Egert, Rolf, Grube, Tim, Born, Dustin, Mühlhäuser, Max |
Conference Name | 2019 IEEE Globecom Workshops (GC Wkshps) |
ISBN Number | 978-1-7281-0960-2 |
Keywords | advanced analysis modules, analysis data, automated network reconnaissance, bad application, common IP-based IoT components, computer network security, decision making, Electronic mail, identified network vulnerabilities, intermediate scanning, Internet of Things, Internet of Things devices, IoT devices, IP networks, IP-based networks, meaningful correlation, modular capabilities, modular framework, modular vulnerability indication, multiple tools, Network reconnaissance, network scanner tools, Open Source Software, potential vulnerabilities, Protocols, pubcrawl, Reconnaissance, resilience, Resiliency, Scalability, scanner module, scanning tools, security concepts, severe vulnerabilities, Tools |
Abstract | With the rapidly increasing number of Internet of Things (IoT) devices and their extensive integration into peoples' daily lives, the security of those devices is of primary importance. Nonetheless, many IoT devices suffer from the absence, or the bad application, of security concepts, which leads to severe vulnerabilities in those devices. To achieve early detection of potential vulnerabilities, network scanner tools are frequently used. However, most of those tools are highly specialized; thus, multiple tools and a meaningful correlation of their results are required to obtain an adequate listing of identified network vulnerabilities. To simplify this process, we propose a modular framework for automated network reconnaissance and vulnerability indication in IP-based networks. It allows integrating a diverse set of tools as either, scanning tools or analysis tools. Moreover, the framework enables result aggregation of different modules and allows information sharing between modules facilitating the development of advanced analysis modules. Additionally, intermediate scanning and analysis data is stored, enabling a historical view of derived information and also allowing users to retrace decision-making processes. We show the framework's modular capabilities by implementing one scanner module and three analysis modules. The automated process is then evaluated using an exemplary scenario with common IP-based IoT components. |
URL | https://ieeexplore.ieee.org/document/9024519 |
DOI | 10.1109/GCWkshps45667.2019.9024519 |
Citation Key | egert_modular_2019 |
- Reconnaissance
- modular vulnerability indication
- multiple tools
- Network reconnaissance
- network scanner tools
- Open Source Software
- potential vulnerabilities
- Protocols
- pubcrawl
- modular framework
- resilience
- Resiliency
- Scalability
- scanner module
- scanning tools
- security concepts
- severe vulnerabilities
- tools
- intermediate scanning
- analysis data
- automated network reconnaissance
- bad application
- common IP-based IoT components
- computer network security
- Decision Making
- Electronic mail
- identified network vulnerabilities
- advanced analysis modules
- Internet of Things
- Internet of Things devices
- IoT devices
- IP networks
- IP-based networks
- meaningful correlation
- modular capabilities