0% found this document useful (0 votes)
75 views

An Automated End-To-End Penetration Testing For Iot: Abstract - in The Internet of Things (Iot) Environment, Objects

This paper proposes an automated framework for end-to-end penetration testing of IoT networks. The framework aims to test entire networks as connected systems, rather than individual components in isolation. It will automatically discover vulnerabilities, conduct attacks against the network, and generate a report of findings and recommendations to improve security.

Uploaded by

Yofa Kurniawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views

An Automated End-To-End Penetration Testing For Iot: Abstract - in The Internet of Things (Iot) Environment, Objects

This paper proposes an automated framework for end-to-end penetration testing of IoT networks. The framework aims to test entire networks as connected systems, rather than individual components in isolation. It will automatically discover vulnerabilities, conduct attacks against the network, and generate a report of findings and recommendations to improve security.

Uploaded by

Yofa Kurniawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

情報処理学会第 81 回全国大会

5F-05

An automated End-To-End Penetration testing for IoT


Alaa Allakany*, Geeta Yadav**, Vijay Kumar**, Kolin Paul***, and Koji Okamura****
* Cybersecurity Center, Kyushu University, Japan.
** School of Information Technology, IIT Delhi, India.
*** Department of Computer science & Engineering IIT Delhi, India.
**** Research Institute for Information Technology, Kyushu University, Japan.

Abstract— In the Internet of Things (IoT) environment, objects defensive measures employed on the system are strong
are connected together on a network to share data, however, some enough to prevent any security breaches. Penetration test
of the IoT devices are developed and deployed with poor security reports also suggest the countermeasures that can be taken to
consideration. As a result, these devices became a target of
reduce the risk of the system being hacked. The purpose of
attacks. In this study, we will propose a framework for automated
penetration testing automation is to reduce the costs in terms
End-to-End penetration testing for IoT network. The existing
penetration testing deployed based on the expert testers who have of time and people (human resources) needed to perform the
the knowledge to perform a manual test using many tolls, but this test[2,3].
kind of manual Pen-test is highly cost and low efficiency.
Furthermore, the existing automated penetration test doesn’t II. RELATED WORK AND RESEARCH OBJECTIVE
consider End-to-End test for a system, it works by testing each part PENTOS is one of the most related system to our system
of a system separately that can lead to a gab that make the test not
[4], it is a penetration testing tool for IoT devices. In this
efficient. Due to such shortages, our framework will test the End-
paper, the author presented a testing tool to automated
to-End network automatically (i.e., End devices, wireless
communication between devices and the control unit, then penetration test for IoT devices, this tool provide a graphic
communication to cloud server, and finally communication from interface for user to choice which part (item) of network to
the cloud to end user through mobile app or webpage). The test. For instance, the user can select password attack,
proposed framework will automatically gather the information of wireless attack or web hacking to a specific target in the
the target IoT network and then perform various kinds of network. However, we will prove in our paper that
penetration testing through the network. Then it will summarize the separating the automated penetration testing for a network
results of Pen-test and gives the recommendations to secure a items can cause a new gaps that cannot detected by such
system.
penetration testing tools.
Objectives of this study: is to automated and provide
I. INTRODUCTION
End-to-End penetration testing process in order to aid the
Internet of things (IoT) is the system which devices can organization to enhance the security of their system. The
communicate with each other in order to provide a unique main points of the proposed system as follows: The system
service for user’s convenience and create a new way of data should cover all parts of a penetration testing process
exchange. With growing IoT space, many of IoT device’s automatically. The system should consider that the testing of
provider developed a cheap devices without security separated levels (items) of IoT network can lead to a gaps,
consideration, these devices have many vulnerabilities that thus, it should test all items on the network as connected
can be used by hackers to attack IoT space [1]. With network levels. The system should be able to incorporate
increasing risk of vulnerabilities resulting from these poor new tools in an easy way. Finally, results found by the
security devices, penetration testing is required for testing system will be presented in an easy-to-understand way.
your IoT system and provide instructions to enhance the
security on the system. To validate our proposed Penetration testing, we will
perform experiments with different examples of IoT
Penetration testing is a process to identify security networks as case studies of this system. Figure 1, shows the
vulnerabilities by evaluating the system or network with definition of End-to-End in our system and shows some case
various malicious techniques. The weak points of a system studies that will tested based on our system, for instance,
are exploited in this process through an authorized simulated Philips hue and Alexa.
attack. The purpose of this test is to secure important data
from outsiders like hackers who can have unauthorized In the future, we will add other case studies to the
access to the system. Once the vulnerability is identified it is proposed penetration testing framework. Moreover, it will be
used to exploit the system in order to gain access to sensitive open source project so any other researchers can extend this
information. A penetration test tells whether the existing project with many different IoT device systems.

Copyright 2019 Information Processing Society of Japan.


3-387 All Rights Reserved.
情報処理学会第 81 回全国大会

B. Discovery
The penetration testing start with this step. The main task of
this step is to finds the vulnerabilities on the target system
by port and network scanning. Also, there are some other
activity in this step such as packet capturing, banner
grabbing. Then, the system apply the vulnerability analysis
to be used as input data to the next step of the penetration
testing.
C. Attack
In this step of testing the system performing the attacks on
the IoT network. The attacks are performed on the
Figure 1: Overview of End-to-End vulnerabilities that have been discovered through the
previous step (discovery phase). On this step of testing the
proposed system will test every discovered vulnerability and
III. DESIGN a loop of attack will be continued until all the objectives of
Since the organization need to perform the pentation the attack phase are completed.
testing regular in following situations: new infrastructure is D. Reporting
added, software is installed, system updates are applied, Finally, all result of the previous two step of this test will be
security patches are applied and user policies are modified. compiled and presented as a report to users, this report
These items have to be tested in each time the organization include the details of the vulnerabilities and the attacks
perform any change to the system. It can be tested manually performed on the target system.
by expert tester or automatically by automated system. We
IV. CONCLUSION
showed in introduction that automated system have many
We will proposed the End-to-End Penetrating testing that
advantages comparing with manual test. However, the
provides the user with the ability to have a test from inside or
existing automated system provide a separate testing for each
outside the system automatically. Once the user connect to
level of the system individually [4]. The existing automated
the system the proposed framework will scan the system for
system didn’t consider that these separated items are
any vulnerabilities and then attack script is triggered and
connected on one system and testing each level (items) of the
maliciously crafted packets are sent to the specified system.
system separately can cause some gabs (vulnerabilities) that
Once the attack is completed a report is generated. This End-
cannot discover by such automated pentation testing. For that
to-End pen-test enables the user to identify and analyze the
our method will cover End-to-End Penetration testing for IoT
security threats.
system.
We will show later on our full paper a mathematical ACKNOWLEDGMENT
model that prove that testing each level (item) of the system
This research was supported by Strategic International
separately can cause some vulnerabilities that cannot
Research Cooperative Program, Japan Science and
detected by existing automated system. Figure 2 summarize
Technology Agency (JST) , SICORP and JSPS KAKENHI
the main steps of any pentation testing that also will be
Grant Number JP16K00480.
similar to our proposed pen-test, but the framework that we
going to proposed it can test the End to End IoT system one
REFERENCES
time. The following sub-section show the steps of the
proposed framework. [1] Eduard Kovacs. “Brian Kreb’s Blog Hit by 665 Gbps DDoS Attack”.
21 September 2016 [Online]. Available:
A. Planning http://www.securityweek.com/brian-krebs-blog-hit-665-gbps-
ddosattack.
This is the first stage in penetration testing. This stage [2] M. Denis, C. Zena and T. Hayajneh, "Penetration testing: Concepts,
usually involves the standard planning steps of setting goals. attack methods, and defense strategies," 2016 IEEE Long Island
Systems, Applications and Technology Conference (LISAT),
It work by gathering all information about the target system Farmingdale, NY, 2016. pp. 1-6. doi: 10.1109/LISAT.2016.7494156.
and mapping the network. [3] L. Epling, B. Hinkel, and Y. Hu, "Penetration Testing in a Box", 2015
Information Security Curriculum Development Conference (InfoSec
'15), ACM, New York, USA, Article 6.
[4] V. Visoottiviseth, P. Akarasiriwong, and S. Chaiyasart, Siravit
Chotivatunyu, “PENTOS: Penetration Testing Tool for Internet of
Thing Devices”. Proc. of the 2017 IEEE Region 10 Conference
(TENCON), Malaysia, November 5-8, 2017.

Figure 2: Steps of penetration testing

Copyright 2019 Information Processing Society of Japan.


3-388 All Rights Reserved.

You might also like