Leveraging operational technology and the Internet of things to attack smart buildings
In recent years, the buildings where we spend most part of our life are rapidly evolving. They are becoming fully automated environments where energy consumption, access control, heating and many other subsystems are all integrated within a single system commonly referred to as smart building (SB)....
Gespeichert in:
Veröffentlicht in: | Journal of Computer Virology and Hacking Techniques 2021-03, Vol.17 (1), p.1-20 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 20 |
---|---|
container_issue | 1 |
container_start_page | 1 |
container_title | Journal of Computer Virology and Hacking Techniques |
container_volume | 17 |
creator | dos Santos, Daniel Ricardo Dagrada, Mario Costante, Elisa |
description | In recent years, the buildings where we spend most part of our life are rapidly evolving. They are becoming fully automated environments where energy consumption, access control, heating and many other subsystems are all integrated within a single system commonly referred to as smart building (SB). To support the growing complexity of building operations, building automation systems (BAS) powering SBs are integrating consumer range Internet of things (IoT) devices such as IP cameras alongside with operational technology (OT) controllers and actuators. However, these changes pose important cybersecurity concerns since the attack surface is larger, attack vectors are increasing and attacks can potentially harm building occupants. In this paper, we analyze the threat landscape of BASs by focusing on subsystems which are strongly affected by the advent of IoT devices such as video surveillance systems and smart lightining. We demonstrate how BAS operation can be disrupted by simple attacks to widely used network protocols. Furthermore, using both known and 0-day vulnerabilities reported in the paper and previously disclosed, we present the first (at our knowledge) BAS-specific malware which is able to persist within the BAS network by leveraging both OT and IoT devices connected to the BAS. Our research highlights how BAS networks can be considered as critical as industrial control systems and security concerns in BASs deserve more attention from both industrial and scientific communities. Even within a simulated environment, our proof-of-concept attacks were carried out with relative ease and a limited amount of budget and resources. Therefore, we believe that well-funded attack groups will increasingly shift their focus towards BASs with the potential of impacting the live of thousands of people. |
doi_str_mv | 10.1007/s11416-020-00358-8 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2493118015</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2493118015</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-32258369e585d05724bbe333fa53cb752243bd4a85a066613ca1756d54023a7b3</originalsourceid><addsrcrecordid>eNp9UMtOwzAQtBBIVKU_wMkS58DaGzvuEVU8KlXiAlwtJ3HSlBAX20Hq3-MSJDhx2lntzGh2CLlkcM0AipvAWM5kBhwyABQqUydkxrnETBWIp3_wOVmEsAMAxoUqpJiR1439tN603dBSt08odm4wPY222g6ud-2BmqGmcWvpeojWDzZS16Q9CQKNjpoYTfVGw7vxkZZj19fHywU5a0wf7OJnzsnL_d3z6jHbPD2sV7ebrEK2jBnylAPl0golahAFz8vSImJjBFZlITjPsaxzo4QBKSXDyrBCyFrkwNEUJc7J1eS79-5jtCHqnRt9eiBoni-RMQVMJBafWJV3IXjb6L3vUuCDZqCPFeqpQp0q1N8VapVEOIlCIg-t9b_W_6i-ANuucu8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2493118015</pqid></control><display><type>article</type><title>Leveraging operational technology and the Internet of things to attack smart buildings</title><source>Springer journals</source><source>Alma/SFX Local Collection</source><creator>dos Santos, Daniel Ricardo ; Dagrada, Mario ; Costante, Elisa</creator><creatorcontrib>dos Santos, Daniel Ricardo ; Dagrada, Mario ; Costante, Elisa</creatorcontrib><description>In recent years, the buildings where we spend most part of our life are rapidly evolving. They are becoming fully automated environments where energy consumption, access control, heating and many other subsystems are all integrated within a single system commonly referred to as smart building (SB). To support the growing complexity of building operations, building automation systems (BAS) powering SBs are integrating consumer range Internet of things (IoT) devices such as IP cameras alongside with operational technology (OT) controllers and actuators. However, these changes pose important cybersecurity concerns since the attack surface is larger, attack vectors are increasing and attacks can potentially harm building occupants. In this paper, we analyze the threat landscape of BASs by focusing on subsystems which are strongly affected by the advent of IoT devices such as video surveillance systems and smart lightining. We demonstrate how BAS operation can be disrupted by simple attacks to widely used network protocols. Furthermore, using both known and 0-day vulnerabilities reported in the paper and previously disclosed, we present the first (at our knowledge) BAS-specific malware which is able to persist within the BAS network by leveraging both OT and IoT devices connected to the BAS. Our research highlights how BAS networks can be considered as critical as industrial control systems and security concerns in BASs deserve more attention from both industrial and scientific communities. Even within a simulated environment, our proof-of-concept attacks were carried out with relative ease and a limited amount of budget and resources. Therefore, we believe that well-funded attack groups will increasingly shift their focus towards BASs with the potential of impacting the live of thousands of people.</description><identifier>ISSN: 2263-8733</identifier><identifier>EISSN: 2263-8733</identifier><identifier>DOI: 10.1007/s11416-020-00358-8</identifier><language>eng</language><publisher>Paris: Springer Paris</publisher><subject>Access control ; Actuators ; Automatic control ; Building automation ; Building management systems ; Computer Science ; Control systems ; Cybersecurity ; Energy consumption ; Energy management ; Industrial electronics ; Internet of Things ; Malware ; Original Paper ; Protocol (computers) ; Smart buildings ; Subsystems ; Surveillance systems</subject><ispartof>Journal of Computer Virology and Hacking Techniques, 2021-03, Vol.17 (1), p.1-20</ispartof><rights>Springer-Verlag France SAS, part of Springer Nature 2020</rights><rights>Springer-Verlag France SAS, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-32258369e585d05724bbe333fa53cb752243bd4a85a066613ca1756d54023a7b3</citedby><cites>FETCH-LOGICAL-c319t-32258369e585d05724bbe333fa53cb752243bd4a85a066613ca1756d54023a7b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11416-020-00358-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11416-020-00358-8$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>dos Santos, Daniel Ricardo</creatorcontrib><creatorcontrib>Dagrada, Mario</creatorcontrib><creatorcontrib>Costante, Elisa</creatorcontrib><title>Leveraging operational technology and the Internet of things to attack smart buildings</title><title>Journal of Computer Virology and Hacking Techniques</title><addtitle>J Comput Virol Hack Tech</addtitle><description>In recent years, the buildings where we spend most part of our life are rapidly evolving. They are becoming fully automated environments where energy consumption, access control, heating and many other subsystems are all integrated within a single system commonly referred to as smart building (SB). To support the growing complexity of building operations, building automation systems (BAS) powering SBs are integrating consumer range Internet of things (IoT) devices such as IP cameras alongside with operational technology (OT) controllers and actuators. However, these changes pose important cybersecurity concerns since the attack surface is larger, attack vectors are increasing and attacks can potentially harm building occupants. In this paper, we analyze the threat landscape of BASs by focusing on subsystems which are strongly affected by the advent of IoT devices such as video surveillance systems and smart lightining. We demonstrate how BAS operation can be disrupted by simple attacks to widely used network protocols. Furthermore, using both known and 0-day vulnerabilities reported in the paper and previously disclosed, we present the first (at our knowledge) BAS-specific malware which is able to persist within the BAS network by leveraging both OT and IoT devices connected to the BAS. Our research highlights how BAS networks can be considered as critical as industrial control systems and security concerns in BASs deserve more attention from both industrial and scientific communities. Even within a simulated environment, our proof-of-concept attacks were carried out with relative ease and a limited amount of budget and resources. Therefore, we believe that well-funded attack groups will increasingly shift their focus towards BASs with the potential of impacting the live of thousands of people.</description><subject>Access control</subject><subject>Actuators</subject><subject>Automatic control</subject><subject>Building automation</subject><subject>Building management systems</subject><subject>Computer Science</subject><subject>Control systems</subject><subject>Cybersecurity</subject><subject>Energy consumption</subject><subject>Energy management</subject><subject>Industrial electronics</subject><subject>Internet of Things</subject><subject>Malware</subject><subject>Original Paper</subject><subject>Protocol (computers)</subject><subject>Smart buildings</subject><subject>Subsystems</subject><subject>Surveillance systems</subject><issn>2263-8733</issn><issn>2263-8733</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9UMtOwzAQtBBIVKU_wMkS58DaGzvuEVU8KlXiAlwtJ3HSlBAX20Hq3-MSJDhx2lntzGh2CLlkcM0AipvAWM5kBhwyABQqUydkxrnETBWIp3_wOVmEsAMAxoUqpJiR1439tN603dBSt08odm4wPY222g6ud-2BmqGmcWvpeojWDzZS16Q9CQKNjpoYTfVGw7vxkZZj19fHywU5a0wf7OJnzsnL_d3z6jHbPD2sV7ebrEK2jBnylAPl0golahAFz8vSImJjBFZlITjPsaxzo4QBKSXDyrBCyFrkwNEUJc7J1eS79-5jtCHqnRt9eiBoni-RMQVMJBafWJV3IXjb6L3vUuCDZqCPFeqpQp0q1N8VapVEOIlCIg-t9b_W_6i-ANuucu8</recordid><startdate>20210301</startdate><enddate>20210301</enddate><creator>dos Santos, Daniel Ricardo</creator><creator>Dagrada, Mario</creator><creator>Costante, Elisa</creator><general>Springer Paris</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20210301</creationdate><title>Leveraging operational technology and the Internet of things to attack smart buildings</title><author>dos Santos, Daniel Ricardo ; Dagrada, Mario ; Costante, Elisa</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-32258369e585d05724bbe333fa53cb752243bd4a85a066613ca1756d54023a7b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Actuators</topic><topic>Automatic control</topic><topic>Building automation</topic><topic>Building management systems</topic><topic>Computer Science</topic><topic>Control systems</topic><topic>Cybersecurity</topic><topic>Energy consumption</topic><topic>Energy management</topic><topic>Industrial electronics</topic><topic>Internet of Things</topic><topic>Malware</topic><topic>Original Paper</topic><topic>Protocol (computers)</topic><topic>Smart buildings</topic><topic>Subsystems</topic><topic>Surveillance systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>dos Santos, Daniel Ricardo</creatorcontrib><creatorcontrib>Dagrada, Mario</creatorcontrib><creatorcontrib>Costante, Elisa</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of Computer Virology and Hacking Techniques</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>dos Santos, Daniel Ricardo</au><au>Dagrada, Mario</au><au>Costante, Elisa</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Leveraging operational technology and the Internet of things to attack smart buildings</atitle><jtitle>Journal of Computer Virology and Hacking Techniques</jtitle><stitle>J Comput Virol Hack Tech</stitle><date>2021-03-01</date><risdate>2021</risdate><volume>17</volume><issue>1</issue><spage>1</spage><epage>20</epage><pages>1-20</pages><issn>2263-8733</issn><eissn>2263-8733</eissn><abstract>In recent years, the buildings where we spend most part of our life are rapidly evolving. They are becoming fully automated environments where energy consumption, access control, heating and many other subsystems are all integrated within a single system commonly referred to as smart building (SB). To support the growing complexity of building operations, building automation systems (BAS) powering SBs are integrating consumer range Internet of things (IoT) devices such as IP cameras alongside with operational technology (OT) controllers and actuators. However, these changes pose important cybersecurity concerns since the attack surface is larger, attack vectors are increasing and attacks can potentially harm building occupants. In this paper, we analyze the threat landscape of BASs by focusing on subsystems which are strongly affected by the advent of IoT devices such as video surveillance systems and smart lightining. We demonstrate how BAS operation can be disrupted by simple attacks to widely used network protocols. Furthermore, using both known and 0-day vulnerabilities reported in the paper and previously disclosed, we present the first (at our knowledge) BAS-specific malware which is able to persist within the BAS network by leveraging both OT and IoT devices connected to the BAS. Our research highlights how BAS networks can be considered as critical as industrial control systems and security concerns in BASs deserve more attention from both industrial and scientific communities. Even within a simulated environment, our proof-of-concept attacks were carried out with relative ease and a limited amount of budget and resources. Therefore, we believe that well-funded attack groups will increasingly shift their focus towards BASs with the potential of impacting the live of thousands of people.</abstract><cop>Paris</cop><pub>Springer Paris</pub><doi>10.1007/s11416-020-00358-8</doi><tpages>20</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2263-8733 |
ispartof | Journal of Computer Virology and Hacking Techniques, 2021-03, Vol.17 (1), p.1-20 |
issn | 2263-8733 2263-8733 |
language | eng |
recordid | cdi_proquest_journals_2493118015 |
source | Springer journals; Alma/SFX Local Collection |
subjects | Access control Actuators Automatic control Building automation Building management systems Computer Science Control systems Cybersecurity Energy consumption Energy management Industrial electronics Internet of Things Malware Original Paper Protocol (computers) Smart buildings Subsystems Surveillance systems |
title | Leveraging operational technology and the Internet of things to attack smart buildings |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T17%3A35%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Leveraging%20operational%20technology%20and%20the%20Internet%20of%20things%20to%20attack%20smart%20buildings&rft.jtitle=Journal%20of%20Computer%20Virology%20and%20Hacking%20Techniques&rft.au=dos%20Santos,%20Daniel%20Ricardo&rft.date=2021-03-01&rft.volume=17&rft.issue=1&rft.spage=1&rft.epage=20&rft.pages=1-20&rft.issn=2263-8733&rft.eissn=2263-8733&rft_id=info:doi/10.1007/s11416-020-00358-8&rft_dat=%3Cproquest_cross%3E2493118015%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2493118015&rft_id=info:pmid/&rfr_iscdi=true |