TY - JOUR
T1 - IoT-PEN
T2 - An E2E penetration testing framework for IoT
AU - Yadav, Geeta
AU - Paul, Kolin
AU - Allakany, Alaa
AU - Okamura, Koji
N1 - Funding Information:
Acknowledgments This research is supported by DST-JST project “Security in the IoT space”, DST Grant Number
Funding Information:
This research is supported by DST-JST project “Security in the IoT space”, DST Grant Number RP03321, JST Grant Number JPMJSC16H3.
Publisher Copyright:
© 2020 Information Processing Society of Japan.
PY - 2020
Y1 - 2020
N2 - The lack of inbuilt security protocols in cheap and resource-constrained Internet of Things (IoT) devices give privilege to an attacker to exploit these device’s vulnerabilities and break into the target device. Attacks like Mirai, Wannacry, Stuxnet, etc. show that a cyber-attack often comprises of a series of exploitations of victim device’s vulner-abilities. Timely detection and patching of these vulnerabilities can avoid future attacks. Penetration testing helps to identify such vulnerabilities. However, traditional penetration testing methods are not End-to-End, which fail to detect multi-hosts and multi-stages attacks. Even if an individual system is secure under some threat model, the attacker can use a kill-chain to reach the target system. In this paper, we introduced first-of-its-kind, IoT-PEN, a Penetration Testing Framework for IoT. The framework follows a client-server architecture wherein all IoT nodes act as clients and “a system with resources” as a server. IoT-PEN is an End-to-End, scalable, flexible and automatic penetration testing framework for discovering all possible ways an attacker can breach the target system using target-graphs. Finally, the paper recommends patch prioritization order by identifying critical nodes, critical paths for efficient patching. Our analysis shows that IoT-PEN is easily scalable to large and complex IoT networks.
AB - The lack of inbuilt security protocols in cheap and resource-constrained Internet of Things (IoT) devices give privilege to an attacker to exploit these device’s vulnerabilities and break into the target device. Attacks like Mirai, Wannacry, Stuxnet, etc. show that a cyber-attack often comprises of a series of exploitations of victim device’s vulner-abilities. Timely detection and patching of these vulnerabilities can avoid future attacks. Penetration testing helps to identify such vulnerabilities. However, traditional penetration testing methods are not End-to-End, which fail to detect multi-hosts and multi-stages attacks. Even if an individual system is secure under some threat model, the attacker can use a kill-chain to reach the target system. In this paper, we introduced first-of-its-kind, IoT-PEN, a Penetration Testing Framework for IoT. The framework follows a client-server architecture wherein all IoT nodes act as clients and “a system with resources” as a server. IoT-PEN is an End-to-End, scalable, flexible and automatic penetration testing framework for discovering all possible ways an attacker can breach the target system using target-graphs. Finally, the paper recommends patch prioritization order by identifying critical nodes, critical paths for efficient patching. Our analysis shows that IoT-PEN is easily scalable to large and complex IoT networks.
UR - http://www.scopus.com/inward/record.url?scp=85091345025&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85091345025&partnerID=8YFLogxK
U2 - 10.2197/ipsjjip.28.633
DO - 10.2197/ipsjjip.28.633
M3 - Article
AN - SCOPUS:85091345025
SN - 0387-6101
VL - 28
SP - 633
EP - 642
JO - Journal of Information Processing
JF - Journal of Information Processing
ER -