Improving Network Security Monitoring for Industrial Control Systems

被引:0
|
作者
Cruz, Tiago [1 ]
Barrigas, Jorge [1 ]
Proenca, Jorge [1 ]
Graziano, Antonio [2 ]
Panzieri, Stefano [3 ]
Lev, Leonid [4 ]
Simoes, Paulo [1 ]
机构
[1] Univ Coimbra, CISUC, DEI, Coimbra, Portugal
[2] Selex ES, Rome, Italy
[3] Univ Rome Tre, Dip Informat & Automaz, Rome, Italy
[4] Israel Elect Corp Ltd, Haifa, Israel
关键词
Industrial Control Systems; Critical Infrastructure Protection; SCADA; Programmable Logic Controllers;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Programmable Logic Controller (PLC) technology plays an important role in the automation architectures of several critical infrastructures such as Industrial Control Systems (ICS), controlling equipment in contexts such as chemical processes, factory lines, power production plants or power distribution grids, just to mention a few examples. Despite their importance, PLCs constitute one of the weakest links in ICS security, frequently due to reasons such as the absence of secure communication mechanisms, authenticated access or system integrity checks. While events such as the Stuxnet worm have raised awareness for this problem, industry has slowly reacted, either due to reliability or cost concerns. This paper introduces the Shadow Security Unit, a low-cost device deployed in parallel with a PLC or Remote Terminal Unit (RTU), being capable of transparently intercepting its communications control channels and physical process I/O lines to continuously assess its security and operational status. The proposed device does not require significant changes to the existing control network, being able to work in standalone or integrated within an ICS protection framework.
引用
收藏
页码:878 / 881
页数:4
相关论文
共 50 条
  • [21] Industrial Control Systems Security: What is happening?
    Krotofil, Marina
    Gollmann, Dieter
    2013 11TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2013, : 664 - 669
  • [22] Industrial Control Systems Security: What is happening?
    Krotofil, Maryna
    Gollmann, Dieter
    2013 11TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2013, : 670 - 675
  • [23] The drift of industrial control systems to pseudo security
    Donnelly, Peter
    Abuhmida, Mabrouka
    Tubb, Christopher
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, 38
  • [24] Strategic Security Protection for Industrial Control Systems
    Takagi, Hitomi
    Morita, Takahito
    Matta, Masafumi
    Moritani, Hiroki
    Hamaguchi, Takashi
    Jing, Sun
    Koshijima, Ichiro
    Hashimoto, Yoshihiro
    2015 54TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2015, : 986 - 992
  • [25] Deep Security Scanner for Industrial Control Systems
    Mahendra, Lagineni
    Hareesh, Reddi
    Kalluri, Rajesh
    Kumar, R. K. Senthil
    Bindhumadhava, B. S.
    2021 IEEE REGION 10 CONFERENCE (TENCON 2021), 2021, : 447 - 452
  • [26] Analysis of Cyber Security for Industrial Control Systems
    Drias, Zakarya
    Serhrouchni, Ahmed
    Vogel, Olivier
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [27] Techniques for Enhancing Security in Industrial Control Systems
    Varadharajan, Vijay
    Tupakula, Uday
    Karmakar, Kallol Krishna
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2024, 8 (01)
  • [28] Digital Twins for Industrial Control Systems Security
    Francia, Guillermo, III
    Hall, Gregory
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 801 - 805
  • [29] Insights on the Security and Dependability of Industrial Control Systems
    Kargl, Frank
    van der Heijden, Rens W.
    Koenig, Hartmut
    Valdes, Alfonso
    Dacier, Marc C.
    IEEE SECURITY & PRIVACY, 2014, 12 (06) : 75 - 78
  • [30] Process query systems for network security monitoring
    Berk, V
    Fox, N
    Sensors, and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Security and Homeland Defense IV, Pts 1 and 2, 2005, 5778 : 520 - 530