Jenny Knackmuß, Thomas Möller, Wilfried Pommerien & Reiner Creutzburg Brandenburg University of Applied Sciences, IT- and Media Forensics Lab, P.O.Box.

Slides:



Advertisements
Similar presentations
Penetration Testing Biometric System
Advertisements

BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Computer Security and Penetration Testing
COEN 252: Computer Forensics Router Investigation.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
COEN 252 Computer Forensics
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 14: Configuring Server Security Compliance
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Software Security Testing Vinay Srinivasan cell:
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Linux Networking and Security
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Unix Security Assessing vulnerabilities. Classifying vulnerability types Several models have been proposed to classify vulnerabilities in UNIX-type Oses.
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
Role Of Network IDS in Network Perimeter Defense.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Kevin Watson and Ammar Ammar IT Asset Visibility.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
Design and development of a prototypical software for semi-automatic generation of test methodologies and security checklists for IT vulnerability.
Critical Security Controls
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Secure Software Confidentiality Integrity Data Security Authentication
Introduction to Networking
Knut Kröger & Reiner Creutzburg
Security in Networking
Protection Mechanisms in Security Management
Presentation transcript:

Jenny Knackmuß, Thomas Möller, Wilfried Pommerien & Reiner Creutzburg Brandenburg University of Applied Sciences, IT- and Media Forensics Lab, P.O.Box 2132, D Brandenburg, Germany Assecor GmbH, Storkower Str. 207, D Berlin, Germany Städtisches Klinikum Brandenburg GmbH, Zentrum für Innere Medizin II, Hochstr. 29, D Brandenburg, Germany Medizinische Hochschule Brandenburg CAMPUS GmbH, Fehrbelliner Straße 38, D Neuruppin, Germany ABSTRACT Nowadays, wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for various medical conditions. Compared to other types of electronics and computing systems, security attacks on these medical devices have extreme consequences and must be carefully analyzed and prevented with strongest efforts. Often, the security vulnerabilities of such systems are not well understood or underestimated. The aim of this paper is to demonstrate security attacks that can easily be done in the laboratory on a popular infusion pump on the market, and to propose defenses against such attacks. INTRODUCTION Medical devices become more and more complex. Many years ago the control of such devices was strictly mechanical. Nowadays, the devices are mechanically, electronically and optically controlled with extensive software. In health care, many different types of systems are found to be capable of communicating with each other. In order to ensure an uninterrupted information flow, these systems need to be integrated and managed in IT networks. There are a number of standards and laws in which the responsibility of the manufacturer is controlled for patient safety. The responsibility for the proper application of the maintenance or operation of medical devices is often left to the hospital. The integration of different medical devices in a hospital network error sources in relation to patient safety arise Medical Devices Directive. Therefore, the aim of this paper to show, what risks may arise when medical devices are not adequately protected in IT network. During the investigation no hardware or software manipulations were carried out. The infusion pump unit is registered to a network and is managed manually through a web server application. Attack Szenario In this paper a typical scenario was simulated and analyzed for security risks. The attacks include sniffing, scanning, ”brute force” method and analysis of Web server functionalities in which sensitive data can be read from the infusion and infusion syringe pump. Sniffing For sniffing in the test network Wireshark is used. Wireshark is a tool that analyzes the network protocols and provides the ”recorded through” data packets in output formats. The infusion pump unit is sending continuously traffic without any manipulation. Therefore, the traffic from the pump could be identified. The next figure shows a recording of data streams from the test network. It is possible to see relevant information such as the IP address of the infusion pump unit and the corresponding MAC address with the name of the manufacturer. After completion of the listening process, a result log is created. This log lists the devices that are registered to the same period in the test network. The medical device was found with the corresponding IP address and MAC address are listed. Security risk of medical devices in IT networks – the case of an infusion pump unit SPIE Defense, Electronic Imaging, “Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2015”, Vol It opens a welcome screen of the device manufac- turer and it must be entered user name and pass- word. Furthermore, the type of the operating system and the device is detected by the scan with Nmap. CONCLUSION With the conducted attack scenario we have illustrated that networked medical devices are a major risk to patient safety in unsecure IT networks. Brute-Force Methode To ensure that only authorized users can access the web server application a user name and a password is required. A brute-force method was to crack the password with the help of the Hydra tool. The containing attack tools are set accordingly and running on the Web server application. Control of the process revealed that the Web server application allows several attempts to enter the user name and passwords - without blocking the access. This brute- force attack may take up to 3 days. However, this was not necessary for this experiment because the default passwords were found on the web through intensive research. The entry of default passwords for each level has been successful on the web server application. Vulnerability of Web Server Application Besides the presented attack several vulnerabilities of web server applications are found. These include: Incorrectly entering the username or password is not transmitting the information that the input is incorrect, but it is communicated in detail the input is wrong where. If an attacker knows the URLs no registration is required, it can be copied into the web browser and an easy access without registration on the Web server application is possible.. Scanning At the beginning of the investigation, a scan with the Open Vulnerability Assessment system (OpenVAS) is performed for the analysis of vulnerabilities. The evaluation protocol showed the highest warning level ”10” for security vulnerabilities. It can be assumed that the control protocols of the pump unit are responsible. An additional scan is performed with the network scanner Nmap. Nmap is a tool for scanning and evaluation of hosts. Here, mainly the open ports are of special interest. In particular, the port 80 and port 443, for the management and monitoring of the infusion pump unit is controlled by a web server application. The scan showed that the corresponding two ports to open the Web application server are open. In order to test the availability of the pump in the test network, the IP address was read out and verified by the brodcast. For the use of the Web server application, the browser must accept to run Java Script and allow cookies. Entering the URL http: // was successful without further restrictions.