Story image

Fujitsu Labs takes network control approach IoT security

29 May 2018

Fujitsu Technologies has developed a new kind of network control technology that is able to secure IoT devices installed in the field.

According to the company, it technology analyses and manages interconnectivity between IoT devices and network devices, based on operating information collected in gateways.

This responds to changes in network structure so it can spot IoT devices that may be behaving in a suspicious way.

Fujitsu Laboratories also developed the technology so that can control communication blocks. The technology can be used in cases where an IoT device is infected in malware and started to attack other devices. The technology can detect that communication by comparing ordinary communication routes through a gateway with the actual routes.

A statement from Fujitsu Laboratories says that IoT adoption has been increasing in many industrial fields, particularly as sensors and manufacturing equipment become connected to networks.

IoT devices have also been damaged by malware attacks worldwide, which has created an urgent need for security countermeasures in IoT devices.

“In many cases, however, IoT devices do not support antivirus software due to CPU, memory, or OS restrictions, and even if antivirus software is deployed, often software updates that require the device to be rebooted are not executed as the IoT device cannot be stopped while in operation. Due to these factors, the current situation is that many IoT devices are operating with insufficient security measures.”

While some vendors have suggested using gateways to separate IoT networks from other networks, however cyber attacks don’t necessarily need to use gateways. If a device is infected with malware and connected inside the network, it’s not possible to protect them from cyber attacks, Fujitsu Laboratories says.

The company approached IoT security from a network topology viewpoint, in which technology can “collect operating information about IoT devices and network devices from gateway devices, deduce the topology of the network the IoT devices are connected to, and appropriately control the network devices based on this information”.

The company tested the technology using a fake malware variant and found that its technology could minimize the impact of cyber attacks when it is installed in gateways.

“With this technology, it will be possible to provide secure operations using existing setups, without exchanging or deploying new IoT devices with security countermeasures in sites such as factories, which require the continued operation of production equipment with long service lifespans.”

Fujitsu Laboratories says it plans to commercialize the technology during fiscal 2018 as gateway functionality for the Fujitsu Network Virtuora series of network products. The company will also continue to develop the technology.

Nuance biometrics fight back against fraud
Nuance Communications has crunched the numbers and discovered that it has prevented more than US$1 billion worth of fraud from being passed on to users of its Nuance Security Suite.
Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Worldwide spending on security to reach $103.1bil in 2019 - IDC
Managed security services will be the largest technology category in 2019.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Norwegian aluminium manufacturer hit hard by LockerGoga ransomware attack
“IT systems in most business areas are impacted and Hydro is switching to manual operations as far as possible.”
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.