Shodan: Using a Text Mining Approach to Identify Vulnerabilities in SCADA Systems

By Lori Cameron
Published 08/03/2018
Share this on:

ShodanSupervisory Control and Data Acquisition (SCADA) systems allow operators to control critical infrastructure. Vendors are increasingly integrating Internet technology into these devices, making them more susceptible to cyberattacks, say the authors of “Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach” in the March/April 2018 issue of IEEE Intelligent Systems.

Identifying and assessing vulnerabilities of SCADA devices using Shodan, a search engine that contains records about publicly available Internet-connected devices, can help mitigate cyberattacks.

The authors present a principled approach to systematically identify all SCADA devices on Shodan and then assess the vulnerabilities of the devices with a state-of-the-art tool.

 


 

About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.