HELOT-Hunting Evil Life in Operational Technology

被引:4
作者
Akailvi, Syed [1 ,2 ]
Gautam, Uddhav [1 ,2 ]
Bhandari, Praveshika [1 ,2 ]
Rashid, Hadi [1 ,2 ]
Huff, Philip D. D. [1 ,2 ]
Springer, Jan P. P. [1 ,2 ]
机构
[1] UA Little Rock, Dept Comp Sci, Little Rock, AR 72224 USA
[2] UA Little Rock, Emerging Analyt Ctr, Little Rock, AR 72224 USA
关键词
Computer forensics; cybersecurity operations; operational technology; power-delivery systems; INTRUSION DETECTION SYSTEM; SCADA; BEHAVIOR;
D O I
10.1109/TSG.2022.3222261
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Operational technology (OT) refers to the industrial counterpart of information technology (IT). OT encompasses technology, systems, and protocols used in industrial operations for controlling, monitoring, and operating of industrial systems. Unlike standard IT systems, OT systems, such as those used in the industry, usually cannot be taken off-line in the event of postmortem forensics investigations. To remedy this situation we present a software architecture and prototype realization that allows the continuous capture of events within OT systems, IT systems, and the interconnected network(s). Our architecture can be realized with existing technologies while also allowing for extension and customization in functionality as well as application to diverse domains. We outline two application cases: capturing of forensics artifacts from a live OT system and possible paths for automation to reduce the cognitive load for cybersecurity operators in combined IT/OT environments.
引用
收藏
页码:3058 / 3071
页数:14
相关论文
共 57 条
[1]   SCADA Systems: Challenges for Forensic Investigators [J].
Ahmed, Irfan ;
Obermeier, Sebastian ;
Naedele, Martin ;
Richard, Golden G., III .
COMPUTER, 2012, 45 (12) :44-51
[2]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[3]  
[Anonymous], 2010, Information TechnologySecurity TechniquesEncryptionPart 3: Block Ciphers
[4]  
[Anonymous], 2006, P 5 INT TOP M NUCL P
[5]  
[Anonymous], 2013, Snort
[6]  
[Anonymous], 2022, AFF4 ADV FOR FIL FOR
[7]  
[Anonymous], ?About us"
[8]  
[Anonymous], BigQuery
[9]  
[Anonymous], 1997, P 20 NAT INF SYST SE
[10]   PRACTICAL METHOD FOR THE DIRECT ANALYSIS OF TRANSIENT STABILITY [J].
ATHAY, T ;
PODMORE, R ;
VIRMANI, S .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1979, 98 (02) :573-584