Visible to the public Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology

TitleIndustrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology
Publication TypeConference Paper
Year of Publication2022
AuthorsNkoro, Ebuka Chinaechetam, Nwakanma, Cosmas Ifeanyi, Lee, Jae-Min, Kim, Dong-Seong
Conference Name2022 13th International Conference on Information and Communication Technology Convergence (ICTC)
Keywordscomposability, compositionality, Industries, Kali Linux, Linux, Linux Operating System Security, Metrics, Network security, Operating systems, Organizations, privacy, pubcrawl, Reconnaissance, resilience, Resiliency, Shodan Eye, Software algorithms, vulnerability analysis
AbstractExploring the efficient vulnerability scanning and detection technology of various tools is one fundamental aim of network security. This network security technique ameliorates the tremendous number of IoT security challenges and the threats they face daily. However, among various tools, Shodan Eye scanning technology has proven to be very helpful for network administrators and security personnel to scan, detect and analyze vulnerable ports and traffic in organizations' networks. This work presents a simulated network scanning activity and manual vulnerability analysis of an internet-connected industrial equipment of two chosen industrial networks (Industry A and B) by running Shodan on a virtually hosted (Oracle Virtual Box)-Linux-based operating system (Kali Linux). The result shows that the shodan eye is a a promising tool for network security and efficient vulnerability research.
NotesISSN: 2162-1241
DOI10.1109/ICTC55196.2022.9952825
Citation Keynkoro_industrial_2022