Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems | SpringerLink
Skip to main content

Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems

  • Conference paper
  • First Online:
Computer Security (CyberICPS 2020, SECPRE 2020, ADIoT 2020)

Abstract

Compared to many other areas of cyber security, vulnerabilities in industrial control systems (ICS) can be poorly understood. These systems form part of critical national infrastructure, where asset owners may not understand the security landscape and have potentially incorrect security assumptions for these closed source, operational technology (OT) systems. ICS vulnerability reports give useful information about single vulnerabilities, but there is a lack of guidance telling ICS owners what to look for next, or how to find these. In this paper, we analyse 9 years of ICS Advisory vulnerability announcements and we recategorise the vulnerabilities based on the detection methods and tools that could be used to find these weaknesses. We find that 8 categories are enough to cover 95% of the vulnerabilities in the dataset. This provides a guide for ICS owners to the most likely new vulnerabilities they may find in their systems and the best ways to detect them. We validate our proposed vulnerability categories by analysing a further 6 months of ICS Advisory reports, which shows that our categories continue to dominate the reported weaknesses. We further validate our proposed detection methods by applying them to a range of ICS equipment and finding four new critical security vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://opencti.io.

  2. 2.

    An example is available at https://us-cert.cisa.gov/ics/advisories/ICSA-17-157-01.

  3. 3.

    Available at https://github.com/uob-ritics/esorics2020-dataset.

  4. 4.

    Exists only in CVSS v3.

  5. 5.

    Of all CVEs categorised, 94% with high availability and integrity impacts were categorised.

  6. 6.

    A full Figure including these individual flows is given in our longer version of this paper.

  7. 7.

    https://github.com/NewEraCracker/LOIC.

References

  1. Andreeva, O., et al.: Industrial Control Systems Vulnerabilities Statistics. Kaspersky Lab, Report (2016)

    Google Scholar 

  2. Antrobus, R., Green, B., Frey, S., Rashid, A.: The forgotten I in IIoT: a vulnerability scanner for industrial internet of things. IET (2019)

    Google Scholar 

  3. Antrobus, R., Frey, S., Green, B., Rashid, A.: SimaticScan: towards a specialised vulnerability scanner for industrial control systems. In: 4th International Symposium for ICS & SCADA Cyber Security Research (2016)

    Google Scholar 

  4. Beresford, D.: Exploiting Siemens Simatic S7 PLCs. Black Hat USA (2011)

    Google Scholar 

  5. Biham, E., Bitan, S., Carmel, A., Dankner, A., Malin, U., Wool, A.: Rogue7: Rogue Engineering-Station attacks on S7 Simatic PLCs. Black Hat USA (2019)

    Google Scholar 

  6. Dragos: CRASHOVERRIDE: Analysis of Threat to Electric Grid Operations (2017)

    Google Scholar 

  7. Dragos: 2018 Year in Review - Industrial Controls System Vulnerabilities (2018)

    Google Scholar 

  8. Dragos: 2019 Year in Review - ICS Vulnerabilities (2019)

    Google Scholar 

  9. Falliere, N., Murchu, L.O., Chien, E.: W32. stuxnet dossier. White paper, Symantec Corp., Security Response (2011)

    Google Scholar 

  10. Gonzalez, D., Alhenaki, F., Mirakhorli, M.: Architectural security weaknesses in industrial control systems (ics) an empirical study based on disclosed software vulnerabilities. In: 2019 IEEE International Conference on Software Architecture (ICSA) (2019)

    Google Scholar 

  11. Hankin, C., Chothia, T., M3, P., Popov, P., Rashid, A., Sezer, S.: Availability of Open Source Tool-Sets for CNI-ICS (2018)

    Google Scholar 

  12. Hemsley, K.E., Fisher, E., et al.: History of Industrial Control System Cyber Incidents. Technical report (2018)

    Google Scholar 

  13. Hui, H., McLaughlin, K.: Investigating current PLC security issues regarding Siemens S7 communications and TIA portal. In: 5th International Symposium for ICS & SCADA Cyber Security Research (2018)

    Google Scholar 

  14. Industrial Control Systems Cyber Emergency Response Team: ICS-CERT Annual Assessment Report FY 2016 (2016)

    Google Scholar 

  15. Jiang, Y., Atif, Y., Ding, J.: Cyber-physical systems security based on a cross-linked and correlated vulnerability database. In: Nadjm-Tehrani, S. (ed.) CRITIS 2019. LNCS, vol. 11777, pp. 71–82. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-37670-3_6

    Chapter  Google Scholar 

  16. Johnson, B., Caban, D., Krotofil, M., Scali, D., Brubaker, N., Glyer, C.: Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruptionto Critical Infrastructure (2017)

    Google Scholar 

  17. Kaspersky ICS CERT: Threat Landscape for Industrial Automation Systems (2019)

    Google Scholar 

  18. Khan, R., Maynard, P., McLaughlin, K., Laverty, D., Sezer, S.: Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid. In: 4th International Symposium for ICS & SCADA Cyber Security Research (2016)

    Google Scholar 

  19. Nelson, T., Chaffin, M.: Common cybersecurity vulnerabilities in industrial control systems. Control Systems Security Program (2011)

    Google Scholar 

  20. Niedermaier, M., et al.: You snooze, you lose: measuring PLC cycle times under attacks. In: 12th USENIX Workshop on Offensive Technologies (WOOT) (2018)

    Google Scholar 

  21. OWASP: OWASP Top 10–2017: The Ten Most Critical Web Application Security Risks (2017)

    Google Scholar 

Download references

Acknowledgements

Funding for this paper was provided by the National Cyber Security Centre UK (NCSC UK), Research Institute in Trustworthy Inter-Connected Cyber-Physical Systems (RITICS) and the UK Rail Research and Innovation Network (UKRRIN). We thank the Bristol Cyber Security Group for providing access to an additional device for testing.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard J. Thomas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thomas, R.J., Chothia, T. (2020). Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems. In: Katsikas, S., et al. Computer Security. CyberICPS SECPRE ADIoT 2020 2020 2020. Lecture Notes in Computer Science(), vol 12501. Springer, Cham. https://doi.org/10.1007/978-3-030-64330-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-64330-0_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-64329-4

  • Online ISBN: 978-3-030-64330-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics