Cyber threat intelligence for critical infrastructure security

被引:0
作者
Osliak, Oleksii [1 ,2 ]
Saracino, Andrea [1 ]
Martinelli, Fabio [1 ]
Mori, Paolo [1 ]
机构
[1] CNR, Ist Informat & Telemat, Pisa, Italy
[2] Univ Pisa, Dept Comp Sci, Pisa, Italy
基金
欧盟地平线“2020”;
关键词
access control; cyber threat intelligence; ICS; industry; 4; 0; OPC-UA; usage control; USAGE CONTROL; ACCESS-CONTROL;
D O I
10.1002/cpe.7759
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cyber-attacks are considered the most significant threat to organizations from different sectors, including critical infrastructure. Access to critical assets, including industrial control systems, and control over their usage is one of the security approaches implemented to protect those systems from unauthorized access. However, existing implementations do not support the enforcement of fine-grained authorization policies and do not provide continuous control over data access. Furthermore, existing implementations of the access control paradigm require policy-makers to perform a manual update of policies that do not consider information about potential or ongoing cyber attacks. In this work, we propose a framework that enables continuous control on the execution of access rights in the industrial domain. Furthermore, the framework relies on cyber incident information shared by trusted entities. This information is used for updating security policies in order to prevent possible incidents within the smart factory infrastructure. We also provide experimental results that show the operability and the efficiency of the proposed framework.
引用
收藏
页数:20
相关论文
共 51 条
[1]   Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems [J].
Amthor, Peter ;
Fischer, Daniel ;
Kuehnhauser, Winfried E. ;
Stelzer, Dirk .
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
[2]  
Andreeva O., 2017, Industrial control systems and their online availability
[3]  
Barnum S., 2012, MITRE CORPORATION, V11, P1
[4]   The Cyber Attack on Saudi Aramco [J].
Bronk, Christopher ;
Tikk-Ringas, Eneken .
SURVIVAL, 2013, 55 (02) :81-96
[5]   Usage Control on Cloud systems [J].
Carniani, Enrico ;
D'Arenzo, Davide ;
Lazouski, Aliaksandr ;
Martinelli, Fabio ;
Mori, Paolo .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 63 :37-55
[6]  
Colombo A., 2014, Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP Approach
[7]   A Proposal on Enhancing XACML with Continuous Usage Control Features [J].
Colombo, Maurizio ;
Lazouski, Aliaksandr ;
Martinelli, Fabio ;
Mori, Paolo .
GRIDS, P2P AND SERVICES COMPUTING, 2010, :133-+
[8]  
Drias Z., 2015, International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), P1, DOI [10.1109/SSIC.2015.7245330, DOI 10.1109/SSIC.2015.7245330]
[9]  
Easttom C., 2019, Computer security fundamentals
[10]  
Hong HJ, 2017, IEEE INT SYM BROADB, P13