首页> 外文会议>International System Safety Conference >Applying Lessons from Cyber Attacks on Ukrainian Infrastructures to Secure Gateways onto the Industrial Internet of Things
【24h】

Applying Lessons from Cyber Attacks on Ukrainian Infrastructures to Secure Gateways onto the Industrial Internet of Things

机译:从网络攻击中应用乌克兰基础设施的课程,以保护网关到工业互联网上

获取原文

摘要

Previous generations of safety-related industrial control systems were ‘air gapped.’ In other words, process control components including Programmable Logic Controllers (PLCs) and smart sensor/actuators were disconnected and isolated from local or wide area networks. This provided a degree of protection;; attackers needed physical access to compromise control systems components. Over time this ‘air gap’ has gradually been eroded. Switches and gateways have subsequently interfaced industrial protocols, including Profibus and Modbus, so that data can be drawn from safety-related Operational Technology into enterprise information systems using Transmission Control Protocol/Internet Protocol (TCP/IP). Senior management uses these links to monitor production processes and inform strategic planning. The Industrial Internet of Things represents another step in this evolution—enabling the coordination of physically distributed resources from a centralized location. The growing range and sophistication of these interconnections create additional security concerns for the operation and management of safety-critical systems. This paper uses lessons learned from recent attacks on Ukrainian critical infrastructures to guide a forensic analysis of an Industrial Internet of Things (IIoT) switch. The intention is to identify and mitigate vulnerabilities that would enable similar attacks to be replicated across Europe and North America.
机译:前几代安全相关工业控制系统是“空气堵塞”。换句话说,包括可编程逻辑控制器(PLC)和智能传感器/执行器的过程控制组件断开和隔离,与本地或广域网隔离。这提供了一种保护程度;攻击者需要物理访问来危及控制系统组件。随着时间的推移,这种“气隙”逐渐被侵蚀。随后的交换机和网关随后接口的工业协议,包括PROFIBUS和MODBUS,因此可以使用传输控制协议/互联网协议(TCP / IP)从安全相关的操作技术从安全相关操作技术中汲取数据。高级管理层使用这些链接来监控生产流程并告知战略规划。工业互联网代表了这一进化中的另一步 - 从集中位置协调物理分布的资源。这些互连的越来越多的范围和复杂程度为安全关键系统的操作和管理创造了额外的安全问题。本文使用最近攻击乌克兰关键基础设施的经验教训,从而指导对事业互联网(IIOT)开关的法医分析。目的是识别和缓解漏洞,这些漏洞将使欧洲和北美能够复制类似的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号