首页> 外文会议>International conference on ICT systems security and privacy protection >A Mai ware-Tolerant, Self-Healing Industrial Control System Framework
【24h】

A Mai ware-Tolerant, Self-Healing Industrial Control System Framework

机译:一个Mai储存,自我修复的工业控制系统框架

获取原文

摘要

Industrial Control Systems (ICSs) are computers managing many critical infrastructures like power plants, aeroplanes, production lines, etc. While ICS were specialised hardware circuits without internet connection in former times, they are nowadays commodity computers with network connection, TCP/IP stack, and a full operating system, making them vulnerable to common attacks. The defensive mechanisms, however, are still lacking behind due to the strong requirement for availability of ICSs which prohibits to deploy typical countermeasures like e.g. an anti-virus. New techniques are needed to defend these systems under their distinct prerequisites. We introduce the concept of a malware-tolerant ICS network architecture which can still operate securely even when some components are entirely compromised by an attacker. This was done by replacing all single point-of-failures with multiple components verifying each other. We provide ProVerif proofs to show the correctness of the network protocol one-by-one assuming each device compromised. Furthermore, we added a self-healing mechanism based on invariants to the architecture on network as well as system level which will reset failed or compromised systems. To demonstrate system level self-healing, we implemented it on top of FreeRTOS and ARM TrustZone. The network level self-healing was incorporated into the ProVerif proofs by formally verifying the absence of type 1 (falsely identified attacks) and type 2 errors (missed attacks).
机译:工业控制系统(ICSS)是管理电厂,飞机,生产线等的许多关键基础设施的计算机。当ICS是专门的硬件电路时,在未来一次互联网连接,它们是具有网络连接的商品计算机,TCP / IP堆栈,和一个完整的操作系统,使他们容易受到常见的攻击。然而,由于禁止典型的典型对策,因此仍然缺乏防御机制仍然缺乏落后的责任,这是禁止典型的对策如例如典型的对策。抗病毒。在不同的先决条件下,需要新技术来捍卫这些系统。我们介绍了恶意软件容忍ICS网络架构的概念,即使某些组件完全由攻击者完全损害,仍然可以安全地运行。这是通过用互相验证的多个组件替换所有单一故障点来完成的。我们提供纤维防伪证据,以逐一显示网络协议的正确性,假设每个设备受到损害。此外,我们基于对网络上的架构以及系统级别来添加自我修复机制,以及将重置失败或受损的系统的系统级别。为了展示系统级别自我修复,我们在Freertos和Arm Trustzone之上实施了它。通过正式验证没有类型1(虚假识别的攻击)和类型2错误(错过攻击),通过正式验证网络级别自我愈合纳入纤维防护证据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号