A team of researchers from the Georgia Institute of Technology has made significant strides in enhancing the detection of industrial control systems (ICS) exposed to the Internet. These systems, which are critical to infrastructure such as power grids, manufacturing plants, and water treatment facilities, are increasingly targeted by cyberattacks.
The research, led by Ph.D. student Ryan Pickren from the School of Electrical and Computer Engineering (ECE), focuses on identifying programmable logic controllers (PLCs) — a key component of many ICS networks — vulnerable to online exposure. The new algorithm developed by the team claims to detect a higher number of exposed PLCs compared to existing methods.
A Growing Concern for ICS Security
According to a recent internet intelligence platform Censys analysis, there are more than 40,000 internet-exposed ICS devices in the United States alone. Globally, Shodan, another widely used internet search engine, has identified approximately 110,000 exposed ICS devices. These numbers highlight the growing risk of cyberattacks on critical infrastructure, which could result in significant operational disruptions and potential harm to public safety.
However, researchers believe these figures may only represent the tip of the iceberg. “The reality is that many ICS devices remain hidden from traditional detection methods, leaving critical vulnerabilities unaddressed,” said Ryan Pickren.
The algorithm developed by the Georgia Tech team leverages advanced machine learning techniques and network analysis to uncover ICS devices that might otherwise go unnoticed. The tool is particularly adept at identifying PLCs, often used to control and automate industrial processes.
How the Algorithm Works
Traditional methods for detecting internet-exposed ICS devices rely on scanning for known IP addresses, ports, and protocols associated with these systems. However, these methods can only catch devices that use less common configurations or obfuscate their presence to avoid detection.
The Georgia Tech algorithm enhances detection by analyzing network traffic patterns and correlating them with known behaviors of ICS devices. It can identify devices even when they are operating under atypical configurations.
“Our algorithm essentially acts like a digital detective, piecing together clues from network activity to identify vulnerable systems,” explained Pickren. “This allows us to provide a more comprehensive picture of the ICS exposure landscape.”
Implications for Cybersecurity
The implications of this breakthrough are significant, as the ability to accurately detect internet-exposed ICS devices is a crucial first step in securing them. Due to their critical role in essential services, ICS networks are often seen as prime targets for hackers, including state-sponsored groups and ransomware operators.
In 2021, a ransomware attack on Colonial Pipeline, an essential fuel distributor in the U.S., underscored the devastating impact such breaches can have. Experts believe that better detection and mitigation strategies could prevent similar incidents.
Dr. Raheem Beyah, a cybersecurity expert and Dean of Georgia Tech’s College of Engineering, praised the research, stating:
“Improving visibility into internet-exposed ICS is a game-changer. This tool could help organizations proactively secure their systems before attackers exploit these vulnerabilities.”
A Call to Action for Industry
The research team hopes their algorithm will encourage ICS operators to take a more proactive stance in securing their networks. The tool enables organizations to prioritize patching and other security measures by providing better visibility into exposed devices.
Additionally, the team plans to collaborate with cybersecurity firms and government agencies to integrate the algorithm into broader network security frameworks. The aim is to make the tool widely available, ensuring that even small and medium-sized enterprises can benefit from its capabilities.
Future Research and Development
While the current focus is improving detection, the Georgia Tech team is already exploring ways to enhance the algorithm’s functionality. Future iterations could include automated recommendations for mitigating vulnerabilities or tools to simulate potential attack scenarios, helping organizations understand their risk exposure more comprehensively. Moreover, as the threat landscape evolves, the team intends to update the algorithm to account for new tactics and techniques used by malicious actors.
References:
- Georgia Tech News Center: Georgia Tech School of Electrical and Computer Engineering
- Censys: https://censys.io/
- Shodan: https://www.shodan.io/