An Efficient Tool for Industrial Control System Security Analysis

被引:2
|
作者
Xia, Chuangming [1 ]
Tian, Jing [1 ]
Li, Erqing [1 ]
Zhou, Junwei [1 ]
Xiang, Jianwen [1 ]
Wang, Jin [2 ]
Bai, Liang [2 ]
He, Yueying [2 ]
机构
[1] Wuhan Univ Technol, Hubei Key Lab Transportat IoTs, Wuhan, Peoples R China
[2] CNCERT CC, Beijing, Peoples R China
来源
2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC | 2016年
关键词
Industrial Control System (ICS); Attack Tree; Risk assessment; Defense Suggestion;
D O I
10.1109/DASC-PICom-DataCom-CyberSciTec.2016.84
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of internet, the network connection between Industrial Control System (ICS) and public internet has been becoming more and more closely. What's more, the traditional IT system attacks have been spread to ICS and become more frequently. However, the traditional security analysis of IT system is not enough to be applied to ICS. In this paper, we present a tool called Attack Path Modeling and Analysis System (APMAS), which provides a graphical user interface (GUI) for the user to model and analyze ICS attack interaction. The main four components including network modeling, rule modeling, attack tree modeling and security analysis are briefly described. Moreover, we propose a solution combined with multi-objective optimization to generate a Pareto front consisting of a group of defense suggestions.
引用
收藏
页码:424 / 427
页数:4
相关论文
共 50 条
  • [21] A Heterogeneous Redundant Architecture for Industrial Control System Security
    Dai, Zhihao
    Leeke, Matthew
    Ding, Yulong
    Yang, Shuang-Hua
    2022 IEEE 27TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2022, : 89 - 97
  • [22] Industrial Control System Security by Isolation: A Dangerous Myth
    Groves, Daniel A.
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2011, 103 (07): : 28 - 30
  • [23] Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System
    Alzahrani, Ali
    Aldhyani, Theyazn H. H.
    SUSTAINABILITY, 2023, 15 (10)
  • [24] Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
    He, Sui
    Lei, Ding
    Shuang, Wang
    Liu, Chunbo
    Gu, Zhaojun
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 651 - 655
  • [25] Automated Anomaly Detection Tool for Industrial Control System
    Varkey, Mariam
    John, Jacob
    Umadevi, K. S.
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [26] Venerability and Protection Tool Surveys of Industrial Control System
    Lu, Kuan-Chu
    Liu, I-Hsien
    Li, Jung-Shian
    2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 511 - 515
  • [27] Analysis of the security of VPN configurations in industrial control environments
    Rahimi, Sanaz
    Zargham, Mehdi
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (01) : 3 - 13
  • [28] SECURITY ANALYSIS OF VPN CONFIGURATIONS IN INDUSTRIAL CONTROL ENVIRONMENTS
    Rahimi, Sanaz
    Zargham, Mehdi
    CRITICAL INFRASTRUCTURE PROTECTION V, 2011, 367 : 73 - 88
  • [29] Towards Formal Security Analysis of Industrial Control Systems
    Rocchetto, Marco
    Tippenhauer, Nils Ole
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 114 - 126
  • [30] Using a packet manipulation tool for security analysis of industrial network protocols
    Kobayashi, Tiago H.
    Batista, Aguinaldo B., Jr.
    Brito, Agostinho M., Jr.
    Pires, Paulo S. Motta
    ETFA 2007: 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOLS 1-3, 2007, : 744 - 747