2012 Complexity in Engineering (COMPENG). Proceedings 2012
DOI: 10.1109/compeng.2012.6242970
|View full text |Cite
|
Sign up to set email alerts
|

Challenges and opportunities in securing industrial control systems

Abstract: Industrial Control Systems (ICS) are used for operating and monitoring industrial processes. Recent reports state that current ICS infrastructures are not sufficiently protected against cyber threats. Unfortunately, due to the specific nature of these systems, the application of common security countermeasures is often not effective. This paper summarizes experiences over a series of research efforts for building tools and mechanisms to improve the security and awareness in ICS. In particular, we discuss chall… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 13 publications
0
21
0
Order By: Relevance
“…1) [8,20]. More generally, Layer 1 is the basic control layer, and it consists of physical field devices (drivers, sensors, actuators, et al) and programmable embedded electronic devices (PLCs, RTUs, DCS controllers, et al).…”
Section: Basic Layer Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…1) [8,20]. More generally, Layer 1 is the basic control layer, and it consists of physical field devices (drivers, sensors, actuators, et al) and programmable embedded electronic devices (PLCs, RTUs, DCS controllers, et al).…”
Section: Basic Layer Architecturementioning
confidence: 99%
“…Especially, the Stuxnet virus attacking Irans nuclear facilities sounds an alarm all over the world [7]. As described by Hadziosmanovic [8], one critical reason is due to the fact that these systems are not built with security in mind. Although there are various kinds of security methods in the regular IT system, the information security in the networked control system is essentially different from that in the IT system, and the traditional security methods cannot be applied directly.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional industrial technology networks rarely have regular network traffic due to their high variability (e.g., web users downloading different kinds of content from the Internet or interacting among themselves). However, even if an industrial control network maintains the same topology (i.e., a device always communicates with the same devices) [6], no checks are performed -nor is evidence is maintained -that the same sequences of messages are present in the inter-device communications.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional industrial technology networks rarely have regular network traffic due to their high variability (e.g., web users downloading different kinds of content from the Internet or interacting among themselves). However, even if an industrial control network maintains the same topology (i.e., a device always communicates with the same devices) [6], no checks are performed -nor is evidence is maintained -that the same sequences of messages are present in the inter-device communications.Another problem is that traditional network intrusion detection systems generally search for unusual messages and rarely focus on message sequences, causing sequence attacks to go unnoticed. Specification-based intrusion detection systems can deal with sequence attacks based on the misuse of communications protocols.…”
mentioning
confidence: 99%
“…Finally, we discus promising approaches for detecting the identified threats. This work has appeared as a journal article [1] and a refereed workshop paper [6].…”
Section: Thesis Overviewmentioning
confidence: 99%