Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era
Abstract
:1. Introduction
- A practical use case-based blended teaching methodology for Industry 4.0 and IIoT cybersecurity is proposed. Such a methodology is supported by the use of an online tool like Shodan [26], which is able to accelerate significantly the IIoT device reconnaissance stage and challenges students with real use cases.
- A theoretical and empirical approach to Industry 4.0/IIoT security is provided to help educators to replicate the learning outcomes expected from the course, which have been successfully put in practice in seminars and master courses at University of A Coruña (Spain). For such a purpose, this article provides multiple practical use cases together with useful guidelines to detect and prevent Shodan-based attacks and to help students to understand the impact and security implications involved in the deployment of the latest Industry 4.0 technologies.
- The course teaching results obtained during its four editions are presented and analyzed in order to validate the proposed flipped classroom based approach.
2. State of the Art
2.1. IIoT and Industry 4.0 Cybersecurity Teaching
- To base the practical part on an online tool like Shodan, whose basic functionality can be used by any student with only an Internet connection and a web browser. In addition, no actual class attendance is necessary to access specialized hardware, so in situations like the recent COVID-19 pandemic, students can carry on working remotely.
- To challenge the students and to foster their curiosity by providing real use cases that they have to analyze.
- To present numerous real examples for industrial scenarios in order to raise the student awareness on the severe security problems that anyone with a minimum knowledge can find fast by using tools like Shodan.
2.2. IIoT and Industry 4.0 Cybersecurity Tools
- Recon. In this first phase information on the target is collected. Such data can be obtained from diverse information sources (e.g., web sites, manufacturers, user manuals, datasheets) and usually involves scanning the target ports to look for potential open services, misconfigurations and vulnerabilities.
- Audit/Attack planning. After analyzing the potential entry points of the target, the auditor/attacker needs to create an audit/attack plan. For such a purpose it is necessary to choose the right steps and tools. Regarding the latter, it is often necessary to develop software tools adapted to the audit/attack scenario so as to exploit the vulnerabilities detected in the previous phase.
- Access. The designed plan is executed by making use of the selected tools in order to access the target system by exploiting the detected vulnerabilities.
- Execution. After gaining access, the designed audit/attack plan will continue to take control of the system. In this phase it is usual to perform different actions to maintain the gained access for future intrusions (e.g., by creating a back door).
3. Blended Teaching Methodology
- Basic industrial cybersecurity concepts and cyberattacks. This first part deals with the main concepts on critical infrastructures, essential services, industrial security policies and cyberattack impact. This part can be illustrated with practical examples of industrial cyberattacks, like the ones performed by Agent.btz, Stuxnet or Night Dragon [75].
- Introduction to ICSs. In this second part the essential concepts on ICSs, PLCs, SCADAs, CPSs and Distributed Control Systems (DCSs) are imparted.
- IIoT and Industry 4.0 cybersecurity. The last part of the course introduces the IIoT paradigm, the different Industry 4.0 technologies and analyzes the most relevant attacks on them.
- Week 1: Industrial cybersecurity basics.
- -
- Learning goals:
- ⁎
- To learn the essential concepts behind industrial network security.
- -
- Developed competences:
- ⁎
- To gain knowledge about legal and technical standards used in industrial cybersecurity, their implications in systems design, in the use of security tools and in the protection of information in industrial scenarios.
- ⁎
- To gain knowledge about the role of cybersecurity in the design of new industrial processes, as well as of the singularities and restrictions to be addressed in order to build a secure industrial infrastructure.
- ⁎
- Ability to identify and diagnose the associated risks of cyberattacks on industry and critical infrastructures.
- -
- Addressed topics:
- ⁎
- Introduction to industrial cybersecurity.
- ⁎
- Industrial cybersecurity policies.
- ⁎
- Impact of cyberattacks on industry and critical infrastructures.
- ⁎
- Practical industrial cyberattack use cases.
- ⁎
- Lab 1: Shodan basics.
- Weeks 2 and 3: ICS cybersecurity.
- -
- Learning goals:
- ⁎
- To learn the essential concepts on the different types of ICSs and their security.
- -
- Developed competences:
- ⁎
- To gain knowledge about how the most popular ICS hardware and protocols work and their role in industrial processes.
- ⁎
- To gain knowledge about ICS cybersecurity, including the most relevant attacks and potential defense strategies.
- -
- Addressed topics:
- ⁎
- Types of ICSs.
- ⁎
- Traditional industrial communications architectures.
- ⁎
- Advanced communications architectures.
- ⁎
- CPSs.
- ⁎
- Labs 2 and 3: Practical use cases.
- Week 4: IIoT and Industry 4.0 cybersecurity.
- -
- Learning goals:
- ⁎
- To learn the essential concepts on the security of IIoT and the latest Industry 4.0 technologies.
- ⁎
- To understand the security implications of making use of Industry 4.0 technologies.
- -
- Developed competences:
- ⁎
- To gain knowledge about IIoT hardware, software and infrastructure, as well as about their role in industrial scenarios.
- ⁎
- To gain knowledge about Industry 4.0 technologies and their cybersecurity.
- -
- Addressed topics:
- ⁎
- Introduction to Industry 4.0.
- ⁎
- Introduction to IoT and IIoT systems.
- ⁎
- Main IIoT cyberattacks.
- ⁎
- Main Industry 4.0 cyberattacks.
- ⁎
- Lab 4: Advanced Shodan scripting.
- Weeks 5 and 6: Practical Industry 4.0 cyberattacks.
- -
- Learning goals:
- ⁎
- To understand the main network security issues, and the different protection techniques and attacks for Industry 4.0 systems, as well as to know how to implement them.
- -
- Developed competences:
- ⁎
- To gain knowledge of cyberattack and cyberdefense techniques on Industry 4.0 systems.
- ⁎
- To gain the ability to apply theoretical knowledge to practical situations within the scope of industrial infrastructures, equipment or specific application domains, including precise operating requirements.
- ⁎
- Ability to innovate and contribute to the advance of industrial cybersecurity by designing new algorithms or techniques for industrial devices in order to eventually help in the protection public, private or commercial of industrial assets.
- -
- Addressed topics:
- ⁎
- Cyberattacks to industrial robotics, Unmanned Aerial Vehicles (UAVs), Automatic Guided Vehicles (AGVs) and Autonomous Underwater Vehicles (AUVs).
- ⁎
- Augmented/Mixed/Virtual Reality cybersecurity.
- ⁎
- Cloud/edge/mist computing cybersecurity.
- ⁎
- Blockchain and Distributed Ledger Technology (DLT) cyberattacks.
- ⁎
- Auto-identification system cybersecurity.
- ⁎
- Vertical and horizontal integration system cybersecurity.
- ⁎
- Additive manufacturing cyberattacks.
- ⁎
- Labs 5 and 6: Final project.
- To learn the essential concepts on industrial cybersecurity.
- To understand the different defense and attack techniques that affect industrial systems and to know how to implement them.
- To understand the most common security problems and attacks that affect industrial networks, as well as to know the essential techniques to minimize them.
- To be able to understand the impact and security implications involved in the deployment of the latest Industry 4.0 technologies.
4. Shodan for Practical IIoT/Industry 4.0 Cybersecurity Labs
4.1. Lab 1: Shodan Basics
4.2. Labs 2 and 3: Practical Use Cases
- Guided approach:
- First, the course instructor gives each student a list of Shodan queries like the ones detailed in Appendix A.
- The students then try the queries on Shodan and analyze the obtained results in order to determine which IIoT or Industry 4.0 devices are detected by the queries. Although in many cases the information gathered by Shodan is enough to identify the devices, the students usually need to make use of additional web search engines to find information from the manufacturers or distributors.
- Once the students gather enough information to identify the IIoT/Industry 4.0 devices and understand their essential inner working, they analyze the vulnerabilities and exploits detected by Shodan. Moreover, the students look for additional signs of weak security, like the use of default credentials or outdated security mechanisms.
- Autonomous approach:
- In this approach the course instructor initially gives the students a specific target or a set of targets (i.e., IIoT/Industry 4.0 devices).
- The students first investigate the targets by gathering information from their datasheets or manuals with the objective of understanding how they work and which are their default credentials.
- Then the students build Shodan queries that allow for discovering the targeted devices.
- Finally, the vulnerability assessment is performed with the help of the Shodan exploit API and other data sources like the available Common Vulnerability and Exposure (CVE) reports.
- C4MAX IIoT monitoring devices:
- -
- Shodan query: “[1m[35mWelcome on console”.
- -
- All the devices were completely open through their Telnet service.
- NetBotz monitor:
- -
- Shodan query: “Netbotz appliance”.
- -
- Roughly 40% of the detected devices have no security at all and allow for accessing the environmental data and onboard web cameras. The rest of the devices required authentication.
- Somfy alarm system:
- -
- Shodan query: title:“Centrale” “Pragma: no-cache, no-store”.
- -
- Most alarm systems are properly configured, a couple of them made use of the default administration credentials, so any user with access was able to switch off or on the alarms.
- Proliphix thermostats:
- -
- Shodan query: title:“Status & Control”.
- -
- All the analyzed devices control panels were open and provided the ambient temperature without requiring credentials.
- Automatic tank gauges:
- -
- Shodan query: unleaded.
- -
- All the analyzed devices provided the tank gauge data without carrying out an authentication procedure. In fact, such data could be obtained through Shodan (i.e., no direct connection with the devices was required to gather the IIoT data).
- Electro Industries Gaugetech smart grid meter:
- -
- Shodan query: “Server: EIG Embedded Web Server” “200 Document follows”.
- -
- Most devices provided barely any security in spite of monitoring a critical infrastructure like the electrical grid. Thus, 80% of the analyzed smart meters could be accessed as administrator.
4.3. Lab 4: Advanced Shodan Scripting
5. Teaching Results
5.1. Obtained Results
- A total of 99 students eventually took the whole course (20 students dropped out during the course), delivering 198 reports for the two practical labs.
- A total of 178 different queries were given to the students, of which 118 were eventually analyzed (60 of them were assigned to the 20 drop-outs, but they are not considered in the presented results) and actually targeted 47 different IIoT and Industry 4.0 devices (some of the queries targeted the same devices).
- For each of the 118 Shodan queries, only the first 20 Shodan results were analyzed. This means that a total of roughly 2360 devices were studied.
- For the 47 studied IIoT/Industry 4.0 devices, a total of 3749 vulnerabilities related to already published CVEs were found by the students. Such a high number was mainly due to a few IIoT/Industry 4.0 devices that executed outdated software (e.g., outdated PHP versions, old HTTP servers).
- Of the 2360 studied devices, 205 implemented no authentication mechanisms, while 103 of them made use of the default administration credentials. These results imply that cyberattackers may easily take control over 13% of the analyzed industrial devices. It is relevant to point out that, if the results obtained by the 2020 class were only considered, the mentioned percentage would be roughly 25%, since 220 out of the 900 industrial devices analyzed by the students did not make use of proper security mechanisms.
- Shodan API programming. Some of the students had problems during the development of the Python script. Specifically, the following were their most frequent problems:
- -
- Excessive number of requests. For most account types, Shodan restricts the number of requests to one per second, so it is necessary to include a software delay in the script (in other case Shodan will return an error).
- -
- Use of filters in scripts. Some students had problems when making use of certain filters through Shodan’s programming API because the account type they were using did not allow such a use. There are two potential solutions to this problem: to upgrade the account type or to perform the search in two sequential steps: the first step would gather the data on a specific query, while a second one would parse the collected data according to a certain filter. Obviously, this latter method is clearly slower than the former, since it requires to parse the collected results locally with the developed script.
- -
- Lack of documentation. Shodan’s REST API documentation is clear, but the documentation on some of the wrappers that allow for using it with certain programming languages is not so complete. In the case of the official Python wrapper [85], although it has improved over the last years and provides good examples on basic searches, some content is still missing, like the meaning of certain fields that enable accessing relevant data. For instance, students had problems for determining which information was available on the detected hosts and how to access it (e.g., it is not straightforward to determine that the vulnerability information on a host is accessed through the ‘vuln’ field).
- Lack of knowledge on the analyzed industrial equipment. The students had to look for manufacturer manuals and datasheets in order to understand how the studied devices operated and then determined the impact of potential vulnerabilities.
5.2. Overall Marks and Learning Outcomes
- The students demonstrate at the end of the course that they know the essential concepts on industrial cybersecurity.
- The students are able to apply successfully the course methodology to evaluate through Shodan the security of real industrial systems.
- The students also demonstrate through the lab reports and final projects that they understand the theory behind it and thus they are able to address the most common cybersecurity problems and attacks that affect IIoT/Industry 4.0 systems.
- The students end up being aware of the dangers of exposing insecure industrial devices on the Internet and of the impact derived from the use of non-properly protected devices of diverse Industry 4.0 technologies.
- Due to time and workload constraints, part of the work carried out by the students in their supervised projects was restricted to specific regions (e.g., countries, cities, industrial regions) or industries so as to limit the diversity of analyzed devices and thus get in-depth knowledge on them. Such analyses can provide high-value advice to different industrial companies and sectors. In addition, a cross-comparison of the practicality for different industries and countries can also provide some interesting insights, especially from a business standpoint.
5.3. Student Feedback
- The course was properly structured.
- The amount of work was proportional to the assigned hours.
- The course required guidance from the instructor.
- It was necessary to ask the instructor doubts on the course lectures or labs.
- The evaluation methodology was appropriate considering the imparted content.
- With the content imparted in this course I reached my own learning objectives.
- I am globally satisfied with the course.
6. Conclusions
Supplementary Materials
Author Contributions
Funding
Conflicts of Interest
Appendix A. Practical IIoT and Industry 4.0 Use Cases for Labs 2 and 3
Appendix A.1. IIoT Devices
Appendix A.2. Robotics
Appendix A.3. ICSs, SCADAs and CPSs
Appendix A.4. Additive Manufacturing
Appendix A.5. Big Data Software
Appendix A.6. Cloud Computing
Appendix A.7. Blockchain and Distributed Ledger Technologies (DLTs)
References
- Aceto, G.; Persico, V.; Pescapé, A. A Survey on Information and Communication Technologies for Industry 4.0: State-of-the-Art, Taxonomies, Perspectives, and Challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3467–3501. [Google Scholar] [CrossRef]
- Munera, E.; Poza-Lujan, J.L.; Posadas-Yagüe, J.L.; Simo, J.; Blanes, J.F.; Albertos, P. Control kernel in smart factory environments: Smart resources integration. In Proceedings of the IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), Shenyang, China, 8–12 June 2015. [Google Scholar]
- Xu, L.D.; He, W.; Li, S. Internet of Things in Industries: A Survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [Google Scholar] [CrossRef]
- Wang, Z.; Chen, C.; Guo, B.; Yu, Z.; Zhou, X. Internet Plus in China. IT Prof. 2016, 18, 5–8. [Google Scholar] [CrossRef]
- Center for Strategic and International Studies, Made in China 2025: Critical Questions. Available online: https://www.csis.org/analysis/made-china-2025 (accessed on 30 April 2020).
- Blanco-Novoa, Ó.; Fernández-Caramés, T.M.; Fraga-Lamas, P.; Vilar-Montesinos, M.A. A Practical Evaluation of Commercial Industrial Augmented Reality Systems in an Industry 4.0 Shipyard. IEEE Access 2018, 6, 8201–8218. [Google Scholar] [CrossRef]
- Turner, C.J.; Hutabarat, W.; Oyekan, J.; Tiwari, A. Discrete Event Simulation and Virtual Reality Use in Industry: New Opportunities and Future Trends. IEEE Trans. Hum. Mach. Syst. 2016, 46, 882–894. [Google Scholar] [CrossRef] [Green Version]
- Culot, G.; Orzes, G.; Sartor, M. Integration and Scale in the Context of Industry 4.0: The Evolving Shapes of Manufacturing Value Chains. IEEE Eng. Manag. Rev. 2019, 47, 45–51. [Google Scholar] [CrossRef]
- Schluse, M.; Priggemeyer, M.; Atorf, L.; Rossmann, J. Experimentable Digital Twins—Streamlining Simulation-Based Systems Engineering for Industry 4.0. IEEE Trans. Ind. Inform. 2018, 14, 1722–1731. [Google Scholar] [CrossRef]
- Yu, S.; Malawade, A.V.; Chhetri, S.R.; Al Faruque, M.A. Sabotage Attack Detection for Additive Manufacturing Systems. IEEE Access 2020, 8, 27218–27231. [Google Scholar] [CrossRef]
- Fernández-Caramés, T.M.; Fraga-Lamas, P.; Suárez-Albela, M.; Díaz-Bouza, M.A. A Fog Computing Based Cyber-Physical System for the Automation of Pipe-Related Tasks in the Industry 4.0 Shipyard. Sensors 2018, 18, 1961. [Google Scholar] [CrossRef] [Green Version]
- Xu, X.; Hua, Q. Industrial Big Data Analysis in Smart Factory: Current Status and Research Strategies. IEEE Access 2017, 5, 17543–17551. [Google Scholar] [CrossRef]
- Gonzalez, A.G.C.; Alves, M.V.S.; Viana, G.S.; Carvalho, L.K.; Basilio, J.C. Supervisory Control-Based Navigation Architecture: A New Framework for Autonomous Robots in Industry 4.0 Environments. IEEE Trans. Ind. Inform. 2018, 14, 1732–1743. [Google Scholar] [CrossRef]
- Wan, J.; Tang, S.; Hua, Q.; Li, D.; Liu, C.; Lloret, J. Context-Aware Cloud Robotics for Material Handling in Cognitive Industrial Internet of Things. IEEE Internet Things J. 2018, 5, 2272–2281. [Google Scholar] [CrossRef]
- Fraga-Lamas, P.; Ramos, L.; Mondéjar-Guerra, V.; Fernández-Caramés, T.M. A Review on IoT Deep Learning UAV Systems for Autonomous Obstacle Detection and Collision Avoidance. Remote Sens. 2019, 11, 2144. [Google Scholar] [CrossRef] [Green Version]
- Fernández-Caramés, T.M.; Fraga-Lamas, P. A Review on the Application of Blockchain to the Next Generation of Cybersecure Industry 4.0 Smart Factories. IEEE Access 2019, 7, 45201–45218. [Google Scholar] [CrossRef]
- Lin, C.; Yang, J. Cost-Efficient Deployment of Fog Computing Systems at Logistics Centers in Industry 4.0. IEEE Trans. Ind. Inform. 2018, 14, 4603–4611. [Google Scholar] [CrossRef]
- Fraga-Lamas, P.; Lopez-Iturri, P.; Celaya-Echarri, M.; Blanco-Novoa, O.; Azpilicueta, L.; Varela-Barbeito, J.; Falcone, F.; Fernández-Caramés, T.M. Design and Empirical Validation of a Bluetooth 5 Fog Computing Based Industrial CPS Architecture for Intelligent Industry 4.0 Shipyard Workshops. IEEE Access 2020, 8, 45496–45511. [Google Scholar] [CrossRef]
- Ayaz, M.; Ammad-Uddin, M.; Sharif, Z.; Mansour, A.; Aggoune, E.M. Internet-of-Things (IoT)-Based Smart Agriculture: Toward Making the Fields Talk. IEEE Access 2019, 7, 129551–129583. [Google Scholar] [CrossRef]
- Pérez-Expósito, J.; Fernández-Caramés, T.M.; Fraga-Lamas, P.; Castedo, L. VineSens: An Eco-Smart Decision-Support Viticulture System. Sensors 2017, 17, 465. [Google Scholar] [CrossRef]
- Alam, M.M.; Malik, H.; Khan, M.I.; Pardy, T.; Kuusik, A.; Le Moullec, Y. A Survey on the Roles of Communication Technologies in IoT-Based Personalized Healthcare Applications. IEEE Access 2018, 6, 36611–36631. [Google Scholar] [CrossRef]
- Fraga-Lamas, P.; Fernández-Caramés, T.M.; Noceda-Davila, D.; Díaz-Bouza, M.; Vilar-Montesinos, M.; Pena-Agras, J.D.; Castedo, L. Enabling automatic event detection for the pipe workshop of the shipyard 4.0. In Proceedings of the 2017 56th FITCE Congress, Madrid, Spain, 14–16 September 2017; pp. 20–27. [Google Scholar]
- Rivest, R.L.; Shamir, A.; Adleman, L.M. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
- Suárez-Albela, M.; Fernández-Caramés, T.; Fraga-Lamas, P.; Castedo, L. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications. Sensors 2017, 17, 1978. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Shodan Official Web Page. Available online: https://www.shodan.io (accessed on 30 April 2020).
- Hölbl, M.; Welzer, T. Experience with Teaching Cybersecurity. In Proceedings of the 27th EAEEIE Annual Conference, Grenoble, France, 7–9 June 2017. [Google Scholar]
- Parekh, G.; DeLatte, D.; Herman, G.L.; Oliva, L.; Phatak, D.; Scheponik, T.; Sherman, A.T. Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes. IEEE Trans. Educ. 2018, 61, 11–20. [Google Scholar] [CrossRef]
- European Cybersecurity Organization (ECSO). Position Paper. Gaps in European Cyber Education and Professional Training—WG5 I Education, Training, Awareness, Cyber Ranges. MARCH 2018. Available online: https://www.ecs-org.eu/documents/publications/5bf7e01bf3ed0.pdf (accessed on 5 June 2020).
- Salah, K.; Hammoud, M.; Zeadally, S. Teaching Cybersecurity Using the Cloud. IEEE Trans. Learn. Technol. 2015, 8, 383–392. [Google Scholar] [CrossRef] [Green Version]
- Eliot, N.; Kendall, D.; Brockway, M. A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills. IEEE Access 2018, 61, 34884–34895. [Google Scholar] [CrossRef]
- Tunc, C.; Hariri, S.; De La Peña Montero, F.; Fargo, F.; Satam, P.; Al-Nashif, Y. Teaching and Training Cybersecurity as a Cloud Service. In Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, Boston, MA, USA, 21–25 September 2015; pp. 302–308. [Google Scholar]
- Dawson, M.; Martinez, F.G.; Taveras, P. Framework for the Development of Virtual Labs for Industrial Internet of Things and Hyperconnected Systems. In Proceedings of the 2019 IEEE Learning With MOOCS (LWMOOCS), Milwaukee, WI, USA, 23–25 October 2019; pp. 196–198. [Google Scholar]
- Wiesen, C.; Becker, S.; Fyrbiak, M.; Albartus, N.; Elson, M.; Rummel, N.; Paar, C. Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights. In Proceedings of the 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), Wollongong, NSW, Australia, 4–7 December 2018; pp. 438–445. [Google Scholar]
- Thiriet, J.M.; Mocanu, S. A course in cyber-security, with orientations towards cyber-physical systems. In Proceedings of the 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), Ruse, Bulgaria, 4–6 September 2019; pp. 1–4. [Google Scholar]
- Hendrix, M.; Al-Sherbaz, A.; Bloom, V. Game based cyber security training: Are serious games suitable for cyber security training? Int. J. Serious Games 2016, 3, 1. [Google Scholar] [CrossRef]
- Bock, K.; Hughey, G.; Levin, D. King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing. In Proceedings of the 2018 USENIX Workshop on Advances in Security Education (ASE 18), Baltimore, MD, USA, 13 August 2018. [Google Scholar]
- Ford, V.; Siraj, A.; Haynes, A.; Brown, E. Capture the flag unplugged: An offline cyber competition. In Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, Seattle, WA, USA, 8–11 March 2017; pp. 225–230. [Google Scholar]
- Chapman, P.; Burket, J.; Brumley, D. PicoCTF: A Game- Based Computer Security Competition for High School Students. In Proceedings of the 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14). USENIX Association, San Diego, CA, USA, 18 August 2014. [Google Scholar]
- Root Me. The Fast, Easy, and Affordable Way to Train Your Hacking Skills. Challenge Your Hacking Skills. Available online: https://www.root-me.org/?lang=en (accessed on 29 April 2020).
- Vykopal, J.; Vizvary, M.; Oslejsek, R.; Celeda, P.; Tovarnak, D. Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. In Proceedings of the 2017 IEEE Frontiers in Education Conference (FIE), Indianapolis, IN, USA, 8–21 October 2017; pp. 1–8. [Google Scholar]
- Ruef, A.; Hicks, M.; Parker, J.; Levin, D.; Mazurek, M.L.; Mardziel, P. Build it, break it, fix it: Contesting secure development. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 690–703. [Google Scholar]
- Čeleda, P.; Vykopal, J.; Švábenský, V.; Slavíček, K. KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education, Portland, OR, USA, 11–14 March 2020; pp. 1026–1032. [Google Scholar]
- Mason, G.S.; Shuman, T.R.; Cook, K.E. Comparing the Effectiveness of an Inverted Classroom to a Traditional Classroom in an Upper-Division Engineering Course. IEEE Trans. Educ. 2013, 56, 430–435. [Google Scholar] [CrossRef]
- Yonemura, K.; Yajima, K.; Komura, R.; Sato, J.; Takeichi, Y. Practical security education on operational technology using gamification method. In Proceedings of the 2017 7th IEEE International Conference on Control System, Computing and Engineering (ICCSCE), Penang, Malaysia, 24–26 November 2017; pp. 284–288. [Google Scholar]
- Kaspersky Industrial Protection Simulation (KIPS) Official Webpage. Available online: https://media.kaspersky.com/en/business-security/enterprise/KL_SA_KIPS_overview_A4_Eng_web.pdf (accessed on 30 April 2020).
- Information and Cyber Security Professional Certification Task Force WG5 I. European Human Resources Network for Cyber (EHR4CYBER). Available online: https://exed.solvay.edu/images//2018_EHR4CYBER-WG5_white-paper_information-and-cyber-security-professional-certification_final_v0.1-1-1.pdf (accessed on 5 June 2020).
- SANS. ICS Active Defense and Incident Response. Available online: https://www.sans.org/brochure/course/industrial-control-system-active-defense-and-incident-response/2950 (accessed on 5 June 2020).
- Master Certificate in Cyber Security Course (Red Team). Available online: https://www.jigsawacademy.com/master-certificate-in-cyber-security-red-team/ (accessed on 5 June 2020).
- Cybersecurity Higher Education Database. Available online: https://www.enisa.europa.eu/topics/cybersecurity-education/education-map (accessed on 6 June 2020).
- Programs in Cybersecurity 2020. Available online: https://www.masterstudies.com/Cyber-Security/ (accessed on 6 June 2020).
- NSA. Resources for Students & Educators. Available online: https://www.nsa.gov/resources/students-educators/ (accessed on 6 June 2020).
- NIST Online Learning Content. Available online: https://www.nist.gov/itl/applied-cybersecurity/nice/resources/online-learning-content (accessed on 6 June 2020).
- Maennel, K. Improving and Measuring Learning Effectiveness at Cyber Defence Exercises. Master’s Thesis, University of Tartu, Tartu, Estonia, 2017. Available online: http://comserv.cs.ut.ee/ati_thesis/datasheet.php?id=58410&year=2017 (accessed on 6 June 2020).
- ZMap Project Official Web Page. Available online: http://zmap.io (accessed on 30 May 2020).
- Metasploit Official Web Page. Available online: https://www.metasploit.com (accessed on 30 May 2020).
- Nmap Official Web Page. Available online: https://nmap.org (accessed on 30 May 2020).
- Nessus Official Web Page. Available online: https://www.tenable.com/products/nessus (accessed on 30 May 2020).
- Censys Official Web Page. Available online: https://censys.io (accessed on 30 April 2020).
- ZoomEye Official Web Page. Available online: https://www.zoomeye.org (accessed on 30 May 2020).
- BinaryEdge Official Web Page. Available online: https://www.binaryedge.io (accessed on 30 May 2020).
- Onyphe Official Web Page. Available online: https://www.onyphe.io (accessed on 30 May 2020).
- Fernández-Caramés, T.M.; Fraga-Lamas, P. Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases. Sensors 2020, 20, 3048. [Google Scholar] [CrossRef]
- Albataineh, A.; Alsmadi, I. IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries. In Proceedings of the 2019 IEEE 20th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Washington, DC, USA, 10–12 June 2019; pp. 1–5. [Google Scholar]
- Bugeja, J.; Jönsson, D.; Jacobsson, A. An Investigation of Vulnerabilities in Smart Connected Cameras. In Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Athens, Greece, 19–23 March 2018; pp. 537–542. [Google Scholar]
- Vlajic, N.; Zhou, D. IoT as a Land of Opportunity for DDoS Hackers. Computer 2018, 51, 26–34. [Google Scholar] [CrossRef]
- Industrial Control Systems Shodan Official Web Page. Available online: https://www.shodan.io/explore/category/industrial-control-systems (accessed on 30 April 2020).
- Al-Alami, H.; Hadi, A.; Al-Bahadili, H. Vulnerability scanning of IoT devices in Jordan using Shodan. In Proceedings of the 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), Amman, Jordan, 6–8 December 2017; pp. 1–6. [Google Scholar]
- Lee, T.; Kim, S.; Kim, K. A Research on the Vulnerabilities of PLC using Search Engine. In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 16–18 October 2019; pp. 184–188. [Google Scholar]
- Hansson, A.; Khodari, M.; Gurtov, A. Analyzing Internet-connected industrial equipment. In Proceedings of the 2018 International Conference on Signals and Systems (ICSigSys), Bali, Indonesia, 1–3 May 2018; pp. 29–35. [Google Scholar]
- Abe, S.; Fujimoto, M.; Horata, S.; Uchida, Y.; Mitsunaga, T. Security threats of Internet-reachable ICS. In Proceedings of the 2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), Tsukuba, Japan, 20–23 September 2016; pp. 750–755. [Google Scholar]
- Hasselquist, D.; Rawat, A.; Gurtov, A. Trends and Detection Avoidance of Internet-Connected Industrial Control Systems. IEEE Access 2019, 7, 155504–155512. [Google Scholar] [CrossRef]
- McMahon, E.; Patton, M.; Samtani, S.; Chen, H. Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency. In Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), Miami, FL, USA, 8–10 November 2018; pp. 100–105. [Google Scholar]
- McMahon, E.; Williams, R.; El, M.; Samtani, S.; Patton, M.; Chen, H. Assessing medical device vulnerabilities on the Internet of Things. In Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, China, 20–24 July 2017; pp. 176–178. [Google Scholar]
- Knapp, E.D.; Langill, J.T. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, 2nd ed.; Elsevier, Syngress: Walthman, MA, USA, 2015. [Google Scholar]
- DEF CON Conference Official Web Page. Available online: https://www.defcon.org (accessed on 27 May 2020).
- Black Hat Conference Official Web Page. Available online: https://www.blackhat.com (accessed on 27 May 2020).
- Chaos Computer Club Official Media Repository. Available online: https://media.ccc.de (accessed on 27 May 2020).
- Official Web Page of the Master Program on Cybersecurity Imparted by the Universities of A Coruña and Vigo. Available online: http://munics.es (accessed on 27 May 2020).
- Akhtar, N.; Mian, A. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 2018, 6, 14410–14430. [Google Scholar] [CrossRef]
- Matherly, J. In Complete Guide to Shodan. Collect. Analyze. Visualize. Make Internet Intelligence Work for You; Shodan LLC: Pflugerville, TX, USA, 2017. [Google Scholar]
- Javier Olmedo GitHub Repository for Shodan Filters. Available online: https://github.com/JavierOlmedo/shodan-filters (accessed on 29 April 2020).
- Conpot Official Web Page. Available online: http://conpot.org (accessed on 29 April 2020).
- Honeypot or Not? Available online: https://honeyscore.shodan.io (accessed on 29 April 2020).
- Shodan’s Official Python Wrapper for Its REST API. Available online: [https://shodan.readthedocs.io/en/latest/ (accessed on 26 July 2020).
- Regulation EU 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation). Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=ES (accessed on 30 July 2020).
- Protection of Personal Data, University of A Coruña. Available online: https://www.udc.es/es/sic/avisolegalapp/ (accessed on 30 July 2020).
- Student Participation in the Feedback Survey (4530V01–Máster Universitario en Ciberseguridade). Available online: https://enquisas.sic.udc.es/Resultados/Public/IndiceParticipacion.aspx (accessed on 31 July 2020).
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and Other Botnets. Computer 2017, 50, 80–84. [Google Scholar] [CrossRef]
- Zanchettin, A.M.; Quarta, D.; Maggi, F.; Pogliani, M.; Polino, M.; Zanero, S. Breaking the Laws of Robotics: Attacking Industrial Robots. In Proceedings of the Black Hat, Las Vegas, NV, USA, 22–27 July 2017. [Google Scholar]
- Wilhoit, K.; Hilt, S. The GasPot Experiment: Unexamined Perils in Using Gas-Tank-Monitoring Systems. Forward-Looking Threat Research (FTR) Team A TrendLabsSM Research Paper. Available online: https://www.blackhat.com/docs/us-15/materials/us-15-Wilhoit-The-Little-Pump-Gauge-That-Could-Attacks-Against-Gas-Pump-Monitoring-Systems-wp.pdf (accessed on 30 April 2020).
- Fernández-Caramés, T.M.; Fraga-Lamas, P. Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks. IEEE Access 2020, 8, 21091–21116. [Google Scholar] [CrossRef]
- Fernández-Caramés, T.M.; Fraga-Lamas, P. A Review on the Use of Blockchain for the Internet of Things. IEEE Access 2018, 6, 32979–33001. [Google Scholar] [CrossRef]
- Fraga-Lamas, P.; Fernández-Caramés, T.M. A Review on Blockchain Technologies for an Advanced and Cyber-Resilient Automotive Industry. IEEE Access 2019, 7, 17578–17598. [Google Scholar] [CrossRef]
- Huang, K.; Zhang, X.; Mu, Y.; Wang, X.; Yang, G.; Du, X.; Rezaeibagha, F.; Xia, Q.; Guizani, M. Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Inform. 2019, 15, 3670–3679. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 29 April 2020).
- Ethereum Official Web Page. Available online: https://www.ethereum.org (accessed on 29 April 2020).
- Antminer Official Web Page. Available online: https://www.bitmain.com (accessed on 29 April 2020).
What? (Qualitative) | What? (Quantitative) | How? | |
---|---|---|---|
Observed | Behavioral performance, conflicts | Participation, teamwork, soft skills | Labs, tutorials, questionnaires |
Self-Reported | Context, motivation, engagement | Learning satisfaction | Feedback survey |
Tested | Technical skills, knowledge | Performance | Final project, final exam, lab reports |
Tool | Audit/Attack Phase | Basic Execution Requirements | Scanning Exposure | Ease of Use | Dev. API | Exploit API | Pricing Model |
---|---|---|---|---|---|---|---|
Shodan | Recon | Web browser | No | High | Yes | Yes | Subscriptions from $59 per month. Free for limited results and reduced functionality. Most advanced features are free for academics. |
Censys | Recon | Web browser | No | High | Yes | No | Subscriptions for a large number of queries from $99 per month. Free for a small number of queries per month. |
ZoomEye | Recon | Web browser | No | High | Yes | No | Subscriptions for a large number of results from $70 per month. Free for a limited number of results. |
BinaryEdge | Recon | Web browser | No | High | Yes | No | Subscription price depends on the number of queries per month (from $10/month for 5000 queries). Free for a limited number of results. |
Onyphe | Recon | Web browser | No | High | Yes | No | Perpetual subscription for individuals for 59. Free for a limited number of queries per month. |
ZMap | Recon | Linux, MacOS, BSD | Yes | Medium | No | No | Free (Apache License Version 2.0). |
Metasploit | Recon, Access, Execution | Linux, MacOS, Windows | Yes | Medium | No | No (but exploits can be added) | Free (open-source) and commercial versions are available. |
Nmap | Recon | Linux, MacOS, Windows, BSD | Yes | Medium | Yes | No | Free (open-source). |
Nessus | Recon | Linux, MacOS, Windows | Yes | Medium | Yes | No (but the Dev. API indicates vulnerabilities) | Free trial and commercial version (more than $2000 per year) are available. |
C4MAX Vehicular Monitor | NetBotz Monitor | Somfy Alarm System | Proliphix Thermostats | Automatic Tank Gauges | Electro Industries Gaugetech Smart Grid Meter | |
---|---|---|---|---|---|---|
#Shodan Results | 654 | 103 | 17,294 | 192 | 1621 | 59 |
#Analyzed Devices | 20 | 20 | 20 | 20 | 20 | 20 |
#Devices without Authentication | 20 | 7 | - | - | 20 | 14 |
#Devices with Default Credentials | - | - | 2 | 3 | - | 2 |
#Devices Affected by CVEs | 1 | 2 | - | - | - | - |
#Detected CVEs | 9 | 2 | - | - | - | - |
Lab Reports | Final Project | Final Exam | |
---|---|---|---|
Average | 8.651 | 8.884 | 7.302 |
Median | 8.625 | 9.000 | 7.437 |
Variance | 0.802 | 1.414 | 2.705 |
Question 1 | Question 2 | Question 3 | Question 4 | Question 5 | Question 6 | Question 7 | |
---|---|---|---|---|---|---|---|
Average | 6.46 | 5.85 | 4.54 | 5.38 | 6.92 | 6.58 | 6.46 |
Mode | 7 | 7 | 4 | 7 | 7 | 7 | 7 |
Median | 7 | 6 | 4 | 6 | 7 | 7 | 7 |
1 | 2 | 3 | 4 | 5 | 6 | 7 | |
---|---|---|---|---|---|---|---|
Question 1 | 0 | 0 | 0 | 0 | 2 | 10 | 14 |
Question 2 | 0 | 0 | 2 | 0 | 8 | 6 | 10 |
Question 3 | 0 | 2 | 4 | 8 | 4 | 6 | 2 |
Question 4 | 0 | 0 | 6 | 2 | 4 | 4 | 10 |
Question 5 | 0 | 0 | 0 | 0 | 0 | 2 | 24 |
Question 6 | 0 | 0 | 0 | 2 | 0 | 5 | 19 |
Question 7 | 0 | 0 | 0 | 0 | 4 | 6 | 16 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fernández-Caramés, T.; Fraga-Lamas, P. Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era. Appl. Sci. 2020, 10, 5607. https://doi.org/10.3390/app10165607
Fernández-Caramés T, Fraga-Lamas P. Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era. Applied Sciences. 2020; 10(16):5607. https://doi.org/10.3390/app10165607
Chicago/Turabian StyleFernández-Caramés, Tiago M., and Paula Fraga-Lamas. 2020. "Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era" Applied Sciences 10, no. 16: 5607. https://doi.org/10.3390/app10165607
APA StyleFernández-Caramés, T., & Fraga-Lamas, P. (2020). Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era. Applied Sciences, 10(16), 5607. https://doi.org/10.3390/app10165607