首页> 外文会议>European Conference on Cyber Warfare and Security >Putting Together the Pieces: A Concept for Holistic Industrial Intrusion Detection
【24h】

Putting Together the Pieces: A Concept for Holistic Industrial Intrusion Detection

机译:把戏:整体工业入侵检测的概念

获取原文

摘要

The fourth industrial revolution, resulting in Industry 4.0, provides a variety of novel business cases. These business cases provide benefits with respect to cost, effort, customer satisfaction and production time. Progress in production can be monitored in real-time by the customer, maintenance can be performed in a remote fashion, time- and cost-efficient production of customer specific products is enabled. These business cases are founded on characteristics of digitisation, namely an increase in intercommunication and embedded computational capacities. Besides the advantages derived from the ever present communication properties, it increases the attack surface of a network as well. As industrial protocols and systems were not designed with security in mind, spectacular attacks on industrial systems occurred over the last years. Most industrial communication protocols do not provide means to ensure authentication or encryption. This means attackers with access to a network can read and write information. Originally not meant to be connected to public networks, the use cases of Industry 4.0 require interconnectivity, often through insecure public networks. This lead to an increasing interest in information security products for industrial applications. In this work, the concept for holistic intrusion detection methods in an industrial context is presented. It is based on different works considering several aspects of industrial environments and their capabilities to identify intrusions as an anomaly in network or process data. These capabilities are based on preceding experiments on real and synthetic data. In order to justify the concept, an overview of potential and actual attack vectors and attacks on industrial systems is provided. It is shown that different aspects of industrial facilities, e.g. office IT, shop floor OT, firewalled connections to customers and partners are analysed as well as the different layers of the automation pyramid require different methods to detect attacks. Additionally, the singular steps of an attack on industrial applications are characterised. Finally, a resulting concept for integration of these methods is proposed, providing the means to detect the different stages of an attack by different means.
机译:第四次工业革命,导致行业4.0,提供了各种新颖的商业案例。这些业务案例为成本,努力,客户满意和生产时间提供了福利。生产中的进展可以通过客户实时监控,可以以远程方式进行维护,长时间和成本高效的客户特定产品的生产。这些业务案例建立在数字化的特征上,即互通和嵌入式计算能力的增加。除了从曾经存在的通信属性衍生的优点外,它也增加了网络的攻击面。随着工业协议和系统的设计不受安全的,在过去几年中对工业系统的壮观攻击发生了壮观的攻击。大多数工业通信协议都不提供确保身份验证或加密的手段。这意味着可以访问网络的攻击者可以读取和写入信息。最初不打算与公共网络连接,使用案例4.0需要互连,通常通过不安全的公共网络。这导致对工业应用的信息安全产品的兴趣日益增长。在这项工作中,提出了产业范围中整体入侵检测方法的概念。它基于不同的作品,考虑到工业环境的几个方面及其能力将入侵作为网络或过程数据中的异常识别。这些能力基于真实和合成数据的前一实验。为了证明概念,提供了潜在和实际攻击向量的概述和对工业系统的攻击。结果表明,工业设施的不同方面,例如,办公室IT,商店地板OT,对客户和合作伙伴的防火墙连接以及自动化金字塔的不同层需要不同的方法来检测攻击。此外,对工业应用的攻击的奇异步骤表征。最后,提出了用于集成这些方法的结果的概念,提供通过不同手段检测攻击的不同阶段的手段。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号