首页> 外文期刊>Journal of System Safety >Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems
【24h】

Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems

机译:法医攻击分析与安全关键工业控制系统的网络安全

获取原文
获取原文并翻译 | 示例
       

摘要

Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) applications monitor and control a wide range of safety-related functions. These include energy generation, where failures could have significant, irreversible consequences. They also include the control systems that are used in the manufacture of safety-related products. In this case, "bugs" in an ICS/SCADA system could introduce flaws in the production of components; these flaws remain undetected before being incorporated into safety-related applications. Industrial Control Systems, typically, use devices and networks that are different from conventional IP-based infrastructures. These differences prevent the re-use of existing cyber-security products in ICS/SCADA environments; the architectures, file formats and process structures are all different. This paper supports the forensic analysis of industrial control systems in safety-related applications. In particular, we describe how forensic attack analysis is used to identify weaknesses in devices so that we can both protect components and determine the information that must be analyzed during the aftermath of a cyber-incident. Simulated attacks detect vulnerabilities; a risk-based approach can then be used to assess the likelihood and impact of any breach. These risk assessments are then used to justify both immediate and longer-term countermeasures.
机译:工业控制系统(IC)和监督控制和数据采集(SCADA)应用监控和控制各种相关的功能。这些包括能量产生,其中失败可能具有重要意义,不可逆转的后果。它们还包括用于制造安全相关产品的控制系统。在这种情况下,IC / SCADA系统中的“错误”可以在生产组件的生产中引入缺陷;在被纳入安全相关的申请之前,这些缺陷仍未被发现。通常,使用与传统的基于IP的基础架构不同的设备和网络使用不同的设备和网络。这些差异可以防止在IC / SCADA环境中重复使用现有的网络安全产品;架构,文件格式和过程结构都不同。本文支持在安全相关应用中的工业控制系统的法医分析。特别是,我们描述了法医攻击分析如何用于识别设备中的弱点,以便我们都可以保护组件并确定在网络事件的后果过程中必须分析的信息。模拟攻击检测漏洞;然后可以使用基于风险的方法来评估任何违规的可能性和影响。然后使用这些风险评估来证明即时和长期对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号