A consideration of white list creating algorithm for industrial network protocols at network switch

被引:0
作者
Enomoto, Masatoshi [1 ]
Hosokawa, Shu [2 ]
Sawada, Kenji [3 ]
机构
[1] Yokohama Coll Commerce, Dept Commerce, Yokohama, Kanagawa, Japan
[2] Control Syst Secur Ctr, Sendai, Miyagi, Japan
[3] Univ Elect Commun, Tokyo, Japan
来源
2020 59TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE) | 2020年
关键词
Industrial Protocol; Control System; Network Switch; WhiteList; SCADA; FIREWALL; SYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a control system, a network is often constructed because a central monitoring room monitors the status of control devices and sensors arranged in a wide area. Information from control devices and sensors is transmitted to the central monitoring room using a specific communication protocol. Therefore, many sensors and control devices can be accessed from outside by connecting to a system in the central monitoring room or via a computer in the central monitoring room. Attackers can take over control systems and gather information without the risk of physical intrusion. In order to avoid such vulnerabilities, it is necessary to introduce a defense method into the system, but it is difficult to introduce a system used in the information system due to the characteristics of the control system. We will examine the defense method considering the characteristics of the control system. In this paper, we focus on communications performed between control devices and sensors, and consider a white listing protection method that defines communications that are transferred by network switches. In particular, an object of the present invention is to protect against an attack due to connection of an unauthorized device and an attack for performing unauthorized communication from an authorized devices. In addition, in generating a white list, we discuss functions necessary to reduce the generation cost and management cost.
引用
收藏
页码:45 / 50
页数:6
相关论文
共 14 条
  • [1] Flow whitelisting in SCADA networks
    Barbosa, Rafael Ramos Regis
    Sadre, Ramin
    Pras, Aiko
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2013, 6 (3-4) : 150 - 158
  • [2] Critical State-Based Filtering System for Securing SCADA Network Protocols
    Fovino, Igor Nai
    Coletta, Alessio
    Carcano, Andrea
    Masera, Marcelo
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (10) : 3943 - 3950
  • [3] Modbus/DNP3 State-based Intrusion Detection System
    Fovino, Igor Nai
    Carcano, Andrea
    Murel, Thibault De lacheze
    Trombetta, Alberto
    Masera, Marcelo
    [J]. 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 729 - 736
  • [4] Jung WS, 2016, ASIA-PAC NETW OPER M
  • [5] Kang DH, 2014, INT CONF ADV COMMUN, P324, DOI 10.1109/ICACT.2014.6778974
  • [6] Whitelist Generation Technique for Industrial Firewall in SCADA Networks
    Kang, Dong-Ho
    Kim, Byoung-Koo
    Na, Jung-Chan
    Jhang, Kyoung-Sun
    [J]. FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 525 - 534
  • [7] SCADAWall: A CPI-enabled firewall model for SCADA security
    Li, Dong
    Guo, Huaqun
    Zhou, Jianying
    Zhou, Luying
    Wong, Jun Wen
    [J]. COMPUTERS & SECURITY, 2019, 80 : 134 - 154
  • [8] Obermeier Sebastian, 2014, P 2014 IEEE EMERGING, P1
  • [9] Pareek Himanshu., 2012, International Journal of Computer Science, Engineering Information Technology, V2, P13, DOI DOI 10.5121/IJCSEIT.2012.2502
  • [10] Case Studies of SCADA Firewall Configurations and the Implications for Best Practices
    Ranathunga, Dinesha
    Roughan, Matthew
    Nguyen, Hung
    Kernick, Phil
    Falkner, Nickolas
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2016, 13 (04): : 871 - 884