2018
DOI: 10.1007/978-3-319-99277-8_19
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers

Abstract: Industrial control systems are used to monitor and operate critical infrastructures. For decades, the security of industrial control systems was preserved by their use of proprietary hardware and software, and their physical separation from other networks. However, to reduce costs and enhance interconnectivity, modern industrial control systems increasingly use commodity hardware and software, and are connected to vendor and corporate networks, and even the Internet. These trends expose industrial control syst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Another approach is to actively poll memory address values using an external program [19]. Yet another approach is to use a security block to transmit internal programmable logic controller data [1] to a historian.…”
Section: Anomaly Detection Methodologymentioning
confidence: 99%
See 3 more Smart Citations
“…Another approach is to actively poll memory address values using an external program [19]. Yet another approach is to use a security block to transmit internal programmable logic controller data [1] to a historian.…”
Section: Anomaly Detection Methodologymentioning
confidence: 99%
“…To overcome these challenges, Chan et al [1] proposed the incorporation of a security block module to support programmable logic controller logging and attack detection capabilities. Specifically, they installed a security block (i.e., programmable logic controller code) on the device to capture selected memory content and other internal device information for monitoring purposes.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Other work has proposed techniques to perform live forensics, i.e., investigate potential attacks while the system is running ( Al-Sharif et al, 2018;Taveras, 2013 ). In addition, several approaches have focused on analysing and acquiring evidence from specific ICS devices, namely PLC's ( Chan et al, 2018;Qasim et al, 2020;Yau et al, 2018 ) and engineering workstations ( Hadz ȋosmanovi ć et al, 2012;Myers et al, 2017 ).…”
Section: Related Workmentioning
confidence: 99%