sb-as logo
Story image

Fujitsu Labs takes network control approach IoT security

29 May 2018

Fujitsu Technologies has developed a new kind of network control technology that is able to secure IoT devices installed in the field.

According to the company, it technology analyses and manages interconnectivity between IoT devices and network devices, based on operating information collected in gateways.

This responds to changes in network structure so it can spot IoT devices that may be behaving in a suspicious way.

Fujitsu Laboratories also developed the technology so that can control communication blocks. The technology can be used in cases where an IoT device is infected in malware and started to attack other devices. The technology can detect that communication by comparing ordinary communication routes through a gateway with the actual routes.

A statement from Fujitsu Laboratories says that IoT adoption has been increasing in many industrial fields, particularly as sensors and manufacturing equipment become connected to networks.

IoT devices have also been damaged by malware attacks worldwide, which has created an urgent need for security countermeasures in IoT devices.

“In many cases, however, IoT devices do not support antivirus software due to CPU, memory, or OS restrictions, and even if antivirus software is deployed, often software updates that require the device to be rebooted are not executed as the IoT device cannot be stopped while in operation. Due to these factors, the current situation is that many IoT devices are operating with insufficient security measures.”

While some vendors have suggested using gateways to separate IoT networks from other networks, however cyber attacks don’t necessarily need to use gateways. If a device is infected with malware and connected inside the network, it’s not possible to protect them from cyber attacks, Fujitsu Laboratories says.

The company approached IoT security from a network topology viewpoint, in which technology can “collect operating information about IoT devices and network devices from gateway devices, deduce the topology of the network the IoT devices are connected to, and appropriately control the network devices based on this information”.

The company tested the technology using a fake malware variant and found that its technology could minimize the impact of cyber attacks when it is installed in gateways.

“With this technology, it will be possible to provide secure operations using existing setups, without exchanging or deploying new IoT devices with security countermeasures in sites such as factories, which require the continued operation of production equipment with long service lifespans.”

Fujitsu Laboratories says it plans to commercialize the technology during fiscal 2018 as gateway functionality for the Fujitsu Network Virtuora series of network products. The company will also continue to develop the technology.

Link image
Virtual demo: Diagnose network cabling problems with the LinkIQ Cable+Network Tester
If you’re finding it difficult to install access points and cabling, or if you can’t pinpoint an issue with a video camera or end user, the LinkIQ Cable+Network Tester could be exactly what you need. Try a free, fully interactive demo now.More
Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More
Story image
Thycotic releases new integrations to bolster account governance
“Service accounts are often left defenceless, even by enterprises with established programs for privileged user security."More
Story image
Combine endpoint privilege management with these tools for maximum protection
By integrating an EPM solution with additional technologies, teams can manage the entire security tool stack more easily and enhance each component’s effectiveness.More
Story image
Cybersecurity budgets still not keeping up with threats — report
Executive teams are failing to recognise the level of damage cyber-threats pose to organisations, according to Sophos — many of them taking a ‘conservative approach’ to cybersecurity expenditure.More
Story image
Claroty discovers vulnerabilities in Ovarro TBox RTUs
The vulnerabilities could enable attackers to break into the systems and run code, crash systems, and meddle with configuration files, amongst other malicious actions.More