Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things

被引:51
作者
Al-Hawawreh, Muna [1 ]
den Hartog, Frank [1 ]
Sitnikova, Elena [1 ]
机构
[1] Univ New South Wales, Sch Engn & Informat Technol, Canberra, ACT 2600, Australia
关键词
Brownfield Industrial Internet of Things (IIoT); countermeasures; crypto-ransomware; cybersecurity; edge gate-way; logic locking; targeted ransomware; SECURITY CHALLENGES; MOBILE;
D O I
10.1109/JIOT.2019.2914390
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Much value in a brownfield Industrial Internet of Things (IIoT) implementation resides at its edge tier, where new types of devices and technologies are deployed to interoperate the legacy industrial control systems with servers and systems in the cloud, and leverage the benefits of the Internet of Things technologies. One of these novel devices is the IIoT edge gateway, which is used to connect critical physical systems with the cyber world, and to provide consistent storage, processing, and analytical and controlling capabilities. However, these devices also come with new and advanced threats such as targeted ransomware. In this paper, we investigate this threat in detail. We studied the threat actors' motivations, the anatomy of ransomware for edge gateways, and the likelihood of such ransomware attack to happen in the future. We found that threat actors find IIoT edge gateways attractive ransomware targets due to their vital roles and functionalities in working with critical infrastructure and that the likelihood of such attack to occur is high. We built the first version of a ransomware security testbed for IIoT, and for test purposes, we developed a first version of ransomware target at IIoT edge gateway in a brownfield system. From our measurements we conclude that kernel-related activity parameters are significant indicators of the abnormal behavior caused by cryptoransomware attacks in IIoT edge gateways, much more so even than for similar attacks in information technology server workstation. Thereby, some potential countermeasures for addressing targeted ransomware in IIoT systems are recommended as proactive strategies for dealing with attackers' new techniques and tactics.
引用
收藏
页码:7137 / 7151
页数:15
相关论文
共 60 条
[1]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[2]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166
[3]   Enabling IoT interoperability through opportunistic smartphone-based mobile gateways [J].
Aloi, G. ;
Caliciuri, G. ;
Fortino, G. ;
Gravina, R. ;
Pace, P. ;
Russo, W. ;
Savaglio, C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 81 :74-84
[4]   Virtualization of SCADA testbeds for cybersecurity research: A modular approach [J].
Alves, Thiago ;
Das, Rishabh ;
Werth, Aaron ;
Morris, Thomas .
COMPUTERS & SECURITY, 2018, 77 :531-546
[5]  
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[6]  
[Anonymous], 2017, CYBER SECURITY THREA
[7]  
[Anonymous], 2016, PROOF OF CONCEPT RAN
[8]  
[Anonymous], 2016, IND INT THINGS G, V4
[9]  
[Anonymous], 2018, IND INT THINGS NETW
[10]  
[Anonymous], 2018, NEW VPNFILTER MALW T