Protecting Crutial Things *
نویسندگان
چکیده
Today’s critical infrastructures like the Power Grid are essentially physical processes controlled by computers connected by networks. Once these systems were highly isolated and secure against most security threats. However, in recent years they evolved in several aspects that greatly increased their exposure to cyber-attacks coming from the Internet. Firstly, the computers, networks and protocols in those control systems are no longer proprietary but standard PCs and networks (e.g., wired and wireless Ethernet), and the protocols are often encapsulated on top of TCP/IP. Secondly, these networks are usually connected to the Internet indirectly through the corporate network or to other networks using modems and data links. Therefore these infrastructures have a level of vulnerability similar to other systems connected to the Internet, but the socio-economic impact of their failure can be huge. This scenario, reinforced by several recent incidents [6], is generating a great concern about the security of these infrastructures, especially at government level. Recently, we proposed a reference architecture to protect critical infrastructures, in the context of the CRUTIAL1 EUIST project [5]. The idea is to model the whole infrastructure as a WAN-of-LANs, where the typical facilities that compose it (like power transformation substations or corporate offices) are modeled as collections of LANs interconnected by a wider-area network (WAN). Given the ease of defining LANs in today’ IP architectures (e.g., through Virtual switched LANs), there is virtually no restriction to the level of granularity of our architecture’s LAN, which can go down to a single host. Using this architecture, we reduce the problem of critical infrastructures protection to the problem of protecting LANs from the WAN or other LANs. In consequence, our model and architecture allow us to deal both with outsider threats (protecting a facility from the Internet) and insider threats (protecting a critical host from other hosts in the same physical facility, by locating them in different LANs).
منابع مشابه
A System for Protecting Crutial Things *
Today’s critical infrastructures like the Power Grid are essentially physical processes controlled by computers connected by networks. Once these systems were highly isolated and secure against most security threats. However, in recent years they evolved in several aspects that greatly increased their exposure to cyber-attacks coming from the Internet. Firstly, the computers, networks and proto...
متن کاملD24 Testbeds Deployment of Representative Control Algorithms -interim Report Title of the Deliverable: Testbeds Deployment of Representative Control Algorithms – Interim Report
In CRUTIAL, the deployed testbeds are composed of two platforms. The first platform is based on power electronic converters that are controlled from PCs that are interconnected over an open communication network (at K.U.Leuven). The second platform consists of power station controllers on a real-time control network, interconnected to corporate and control centre networks (at CESI RICERCA). Thi...
متن کاملSecure Information Sharing in an Industrial Internet of Things
This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT). It also identifies necessary security requirements for secure information sharing based on identified security challenges stated by the industry. The paper then proposes a roadmap for improving security in IIoT which investigates both short-term and long-term ...
متن کاملSemantic and Sensitivity Aware Location Privacy Protection for the Internet of Things
Everyday applications and ubiquitous devices contribute data to the Internet of Things, oftentimes including sensitive information of people. This opens new challenges for protecting users’ data from adversaries, who can perform different types of attacks using combinations of private and publicly available information. In this paper, we discuss some of the main challenges, especially regarding...
متن کامل6 - STREP - 027513 Project full title : Critical Utility InfrastructurAL Resilience
This document describes the complete specification of the architecture, services and protocols of the project CRUTIAL. The CRUTIAL Architecture intends to reply to a grand challenge of computer science and control engineering: how to achieve resilience of critical information infrastructures (CII), in particular in the electrical sector. In general lines, the document starts by presenting the m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007