Special Coverage Series

Network Computing

Special Coverage Series


The Dark Side of the Internet of Things

From cameras to industrial controls to GPS systems, the increased connectivity of devices leads to increased risks.

Recent security research and a high-tech scam point up a disturbing number of vulnerabilities in devices and technologies that people have come to rely on. As more devices get linked together in an Internet of Things, the dark side of all the connectivity must be understood.

Case in point is the security implications that came from one researcher whose original goal was to scan the entire IPv4 address space. To do so, the researcher (who has not disclosed his or her identity), created a small software package for scanning IP addresses that could be remotely installed on unsecured devices. "Playing around" with the Nmap Scripting Engine (NSE) and using several basic username password combos, including "root:root" and "admin:admin" the unidentified researcher was able to log in to 420,000 devices and install the scanning code--in effect creating a botnet that the researcher could use to ping the Internet.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

Many of the devices were consumer-grade routers and set-top boxes, according to a story in The Register, but the researcher also netted "Cisco and Juniper hardware, x86 equipment with crypto accelerator cards, industrial control systems, and physical door security systems," according to the story.

In other words, embedded intelligent devices are just as liable as PCs, servers or smartphones to be drafted into botnets or hijacked by attackers. As more companies link up remote sensors, building-automation systems, data-center systems and other industrial machinery, the number of potential points of penetration or points of attack increase as well. Embedded devices pose a particular danger to large, highly automated enterprises as well as any IT operation that uses automated monitoring to keep tabs on its more expensive equipment. Data centers, for example.

Where Am I?

Other research demonstrates the potential exposure in navigation systems. Thanks to the ubiquity of GPS chips in smartphones and turn-by-turn navigation services like those from Google and Waze, hackers could cause real-world traffic jams or send victims off on wild goose chases by compromising those navigation systems, according to a German doctoral student who demonstrated his technique at BlackHat Europe earlier this month.

The protocol used by Google Maps and other services is encrypted using Transport Layer Security (TLS), which operates like a VPN for GPS, theoretically preventing hackers from changing the signals without Google hearing about it.

However, attackers running man-in-the-middle attacks on the end points of TLS connections can insert themselves into the network early enough to be considered a legitimate user by the network's owner, according to Tobias Jeske, a doctoral student at the Institute for Security in Distributed Applications of the Hamburg University of Technology.

Attackers can then alter the GPS data at will, sending victims anywhere but their destinations or misdirecting thousands of vehicles to cause traffic jams.

A far more common use for the exploit, however, would be to compromise the location data of a victim by using smartphone Wi-Fi like ordinary wireless access points, according to Jeske, who also presented a protocol to prevent both exploits and benchmarks for its performance.

Even without a special protocol, Jeske said, it is possible for carriers to limit this vulnerability by linking location information with the one-time authentication data smartphones use to get access to their own networks.

Finally, scam artists in Australia found a way to take control of security cameras inside a casino to cheat at poker. Somehow--it's not clear yet--members of the gang were able to get remote access to cameras in the high-stakes rooms within the Crown Melbourne casino. A member of the gang, posing as a high roller, was invited by the casino to play in the high-stakes room. His confederates used the cameras to spy on opponents and signal him via wireless device the contents of the other players' hands. The gang was able to beat opponents out of Aus$33 million (about US $33.2 million).

What does all of this mean for data center operators? That if you haven't already, it's time to start paying attention to the myriad devices being linked together, from computers to cameras to industrial control systems, and to find out just how open, and vulnerable, they are.



Related Reading



Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 

Editor's Choice

2013 SDN Survey: Growing Pains

2013 SDN Survey: Growing Pains

In this report, we'll look at the state of Software-defined networking in the marketplace and examine the survey results. We'll also outline what a typical SDN infrastructure looks like in 2013, including a controller, programmable infrastructure, applications and network multitenancy. We'll dig into both OpenDaylight and OpenFlow, two open source initiatives that are shaping SDN from outside. Finally, We'll offer guidance for network professionals on how to approach bringing SDN into their own environments.
Get full survey results now! »

Vendor Turf Wars

Vendor Turf Wars

The enterprise tech market used to be an orderly place, where vendors had clearly defined markets. No more. Driven both by increasing complexity and Wall Street demands for growth, big vendors are duking it out for primacy -- and refusing to work together for IT's benefit. Must we now pick a side, or is neutrality an option?
Get the Digital Issue »

WEBCAST: Software Defined Networking (SDN) First Steps

WEBCAST: Software Defined Networking (SDN) First Steps


Software defined networking encompasses several emerging technologies that bring programmable interfaces to data center networks and promise to make networks more observable and automated, as well as better suited to the specific needs of large virtualized data centers. Attend this webcast to learn the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging.
Register Today »

Related Content

From Our Sponsor

How Data Center Infrastructure Management Software Improves Planning and Cuts Operational Cost

How Data Center Infrastructure Management Software Improves Planning and Cuts Operational Cost

Business executives are challenging their IT staffs to convert data centers from cost centers into producers of business value. Data centers can make a significant impact to the bottom line by enabling the business to respond more quickly to market demands. This paper demonstrates, through a series of examples, how data center infrastructure management software tools can simplify operational processes, cut costs, and speed up information delivery.

Impact of Hot and Cold Aisle Containment on Data Center Temperature and Efficiency

Impact of Hot and Cold Aisle Containment on Data Center Temperature and Efficiency

Both hot-air and cold-air containment can improve the predictability and efficiency of traditional data center cooling systems. While both approaches minimize the mixing of hot and cold air, there are practical differences in implementation and operation that have significant consequences on work environment conditions, PUE, and economizer mode hours. The choice of hot-aisle containment over cold-aisle containment can save 43% in annual cooling system energy cost, corresponding to a 15% reduction in annualized PUE. This paper examines both methodologies and highlights the reasons why hot-aisle containment emerges as the preferred best practice for new data centers.

Monitoring Physical Threats in the Data Center

Monitoring Physical Threats in the Data Center

Traditional methodologies for monitoring the data center environment are no longer sufficient. With technologies such as blade servers driving up cooling demands and regulations such as Sarbanes-Oxley driving up data security requirements, the physical environment in the data center must be watched more closely. While well understood protocols exist for monitoring physical devices such as UPS systems, computer room air conditioners, and fire suppression systems, there is a class of distributed monitoring points that is often ignored. This paper describes this class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime.

Cooling Strategies for Ultra-High Density Racks and Blade Servers

Cooling Strategies for Ultra-High Density Racks and Blade Servers

Rack power of 10 kW per rack or more can result from the deployment of high density information technology equipment such as blade servers. This creates difficult cooling challenges in a data center environment where the industry average rack power consumption is under 2 kW. Five strategies for deploying ultra-high power racks are described, covering practical solutions for both new and existing data centers.

Power and Cooling Capacity Management for Data Centers

Power and Cooling Capacity Management for Data Centers

High density IT equipment stresses the power density capability of modern data centers. Installation and unmanaged proliferation of this equipment can lead to unexpected problems with power and cooling infrastructure including overheating, overloads, and loss of redundancy. The ability to measure and predict power and cooling capability at the rack enclosure level is required to ensure predictable performance and optimize use of the physical infrastructure resource. This paper describes the principles for achieving power and cooling capacity management.