首页> 外文会议>Engineering secure software and systems >LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems
【24h】

LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems

机译:LASARUS:减少传统工业控制系统的轻型攻击面

获取原文
获取原文并翻译 | 示例

摘要

Many operational Industrial Control Systems (ICSs) were designed and deployed years ago with little or no consideration of security issues arising from an interconnected world. It is well-known that attackers can read and write sensor and actuator data from Programmable Logic Controllers (PLCs) as legacy ICS offer little means of protection. Replacing such legacy ICS is expensive, requires extensive planning and a major programme of updates often spanning several years. Yet augmenting deployed ICS with established security mechanisms is rarely possible. Legacy PLCs cannot support computationally expensive (i.e., cryptographic) operations while maintaining real-time control. Intrusion Detection Systems (IDSs) have been employed to improve security of legacy ICS. However, attackers can avoid detection by learning acceptable system behaviour from observed data. In this paper, we present LASARUS, a lightweight approach that can be implemented on legacy PLCs to reduce their attack surface, making it harder for an attacker to learn system behaviour and craft useful attacks. Our approach involves applying obfuscation to PLC data whenever it is stored or accessed which leads to a continuous change of the target surface. Obfuscation keys can be refreshed depending on the threat situation, striking a balance between system performance and protection level. Using real-world and simulated ICS data sets, we demonstrate that LASARUS is able to prevent a set of well-known attacks like random or replay injection, by reducing their passing rate significantly—up to a 100 times.
机译:几年前设计和部署了许多可运行的工业控制系统(ICS),很少或根本没有考虑到互连世界带来的安全问题。众所周知,攻击者可以从可编程逻辑控制器(PLC)读取和写入传感器和执行器数据,因为传统ICS几乎无法提供保护。更换这种旧式ICS的成本很高,需要进行广泛的规划,并且通常需要数年的重大更新程序。但是,很少有可能用已建立的安全机制来扩展已部署的ICS。传统PLC无法在维持实时控制的同时支持计算量大(即加密)的操作。入侵检测系统(IDS)已被用来提高传统ICS的安全性。但是,攻击者可以通过从观察到的数据中了解可接受的系统行为来避免检测。在本文中,我们介绍了LASARUS,这是一种轻量级方法,可以在旧式PLC上实施以减少其受攻击的范围,从而使攻击者更难学习系统行为并进行有用的攻击。我们的方法涉及在存储或访问PLC数据时对其进行混淆处理,从而导致目标表面的连续变化。可以根据威胁情况刷新混淆密钥,从而在系统性能和保护级别之间取得平衡。使用真实的和模拟的ICS数据集,我们证明LASARUS能够通过将通过率降低多达100倍来防止一系列众所周知的攻击,例如随机或重放注入。

著录项

  • 来源
  • 会议地点 Bonn(DE)
  • 作者单位

    Security Lancaster Institute, Lancaster University, Lancaster, UK;

    Security Lancaster Institute, Lancaster University, Lancaster, UK;

    Security Lancaster Institute, Lancaster University, Lancaster, UK;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-26 14:05:32

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号