Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures
نویسندگان
چکیده
This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It is the sequel of several previous Dagstuhl seminars: (1) the series “Network Attack Detection and Defense” held in 2008 and 2012, and (2) the Dagstuhl seminar “Securing Critical Infrastructures from Targeted Attacks”, held in 2012. At the seminar, which brought together members from academia an industry, appropriate methods for detecting attacks on industrial control systems (ICSs) and for limiting the impact on the physical components were considered. A central question was whether and how reactive security mechanisms can be made more ICSand process-aware. To some extent it seems possible to adopt existing security approaches from other areas (e. g., conventional networks, embedded systems, or sensor networks). The main question is whether adopting these approaches is sufficient to reach the desired level of security for ICSs. Detecting attacks to the physical components and appropriate reactions to attacks are new aspects that need to be considered as well. The main result of the seminar is a list of recommendations for future directions in ICS security that is presented in this report. Seminar July 13–16, 2014 – http://www.dagstuhl.de/14292 1998 ACM Subject Classification K.6.5 Security and Protection, C.2.0 General, J.7 Computers in Other Systems
منابع مشابه
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)
متن کامل
PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems
In this short paper, we present an integrated approach to detecting and mitigating cyber-attacks to modern interconnected industrial control systems. One of the primary goals of this approach is that it is costeffective, and thus whenever possible it builds on open-source security technologies and open standards, which are complemented with novel security solutions that address the specific cha...
متن کاملExperimental assessment of network design approaches for protecting industrial control systems
This paper surveys and provides experimental results related to network design techniques focused on enhancing the security of industrial control systems. It analyzes defensein-depth strategies, network segmentation, network firewall configurations and the role of intrusion prevention systems, intrusion detection systems and anomaly detection systems. The paper also studies the applicability of...
متن کاملCyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carri...
متن کاملSecuring Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کامل