are currently in use, asset identification is essential to
perform a proper asset management (Vanier, 2001).
This information is required, to determine currently
existing vulnerabilities in the products in use, or if e.g.
security updates are available from the manufacturer.
There are various options for gathering the data
necessary for asset management. Next to manual
gathering with e.g. inventory lists, it is possible to ac-
cess necessary information technically via passive or
active network scanning. While with passive network
scanning the data traffic is used, that already exists in
the network, and with active scanning additional net-
work traffic is brought into the network. This is also
one of the main differences, which usually leads to
a poorer detection rate for passive network scanning.
One of the main reasons for the mostly lower scan
result quality of passive scanning is, that e.g. no in-
formation about the software version used by the de-
vices is transmitted in regular communication. Both
technologies have their right to exist and, depending
on the application, show their strengths. However, in
this work, the focus is on active network and vulnera-
bility scanning as a technology for asset management,
because of the mostly better detection rate.
Due to the strong segmentation in industrial net-
works, active scanning is usually implemented with
scanner nodes in each sub-network. These nodes of-
ten struggle the problem, that if they contain vulner-
abilities themselves, additional attack vectors are cre-
ated.
In this paper we present a secure scanning archi-
tecture for asset management within industrial net-
works with the following contributions:
• Safe and secure scanner architecture for ICSs,
which ensure a slow and therefore gentle device
scanning in fragile networks.
• ICS scanner node based on a bidirectional Intelli-
gent Data Diode (IDD) with strong segmentation.
• Evaluation of the concept with a low-cost pro-
totype, build with common off-the-shelf compo-
nents.
The paper is structured as follows. In Section 2
the current state and challenges of asset management
and industrial network scanning is explained. The
methodology behind the here presented network scan-
ner is introduced in Section 3. Afterwards, the im-
plementation is described and evaluated in Section 4.
At the end, in Section 5, a conclusion and outlook is
given.
2 ASSET MANAGEMENT AND
NETWORK SCANNING IN ICS
NETWORKS
Asset management has various specifics and chal-
lenges in industrial networks. These are taken up and
explained in the following.
2.1 Network Segmentation in ICS
First and one of the most important measures within
a defense-in-depth strategy is the zoning or segmen-
tation of assets within sub-networks. This segmenta-
tion is mostly done according to their application sce-
nario or logical relationship to each other. This results
commonly in sub-networks for IT assets and one or
multiple sub-networks for OT assets. Between these
sub-networks, there are often firewalls (Nivethan and
Papa, 2016) placed between the IT, OT and other sub-
networks. These are used to actively protect against
attacks against the ICS network.
In addition to the obvious advantages of segmen-
tation, it is often implemented because of recom-
mendations or requirements in various guidelines and
standards. For instance “NIST SP800-82 – Guide to
ICS Security” (Stouffer et al., 2015) recommends the
segmentation of control networks and corporate net-
works. In addition to that, the IEC 62443-3-3 (IEC,
2020) in particular “SR 5.1 Network Segmentation”,
describes, that control system networks should be log-
ically segmented from non-control system networks.
Figure 1 shows an example of a common net-
work structure with a defense-in-depth strategy, as
used in manufacturing industry (Kuipers and Fabro,
2006). In this example, the ICS network contains
Programmable Logic Controllers (PLCs), which in-
teracts with the physical world, a Supervisory Con-
trol and Data Acquisition (SCADA) system for mon-
itoring and controlling the process, as well as a Hu-
man Machine Interface (HMI) for user interactions.
In the corporate network, often Manufacturing Exe-
cution System (MES)/Enterprise Resource Planning
(ERP) systems are located, which allows planning of
the production. Furthermore, standard computer and
other standard components like printers are also lo-
cated in the corporate network. In this case, the corpo-
rate network is protected from the untrustworthy In-
ternet with a firewall. In addition, the ICS network is
furthermore protected by a firewall from the corporate
network. If an external attacker 1 wants to take over
the control network, two firewalls must be compro-
mised. An internal attacker or virus in the office net-
work 2 must also compromise the industrial firewall
in order to get access to the ICS network. Only an
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
348