A consideration of white list creating algorithm for industrial network protocols at network switch

被引:0
作者
Enomoto, Masatoshi [1 ]
Hosokawa, Shu [2 ]
Sawada, Kenji [3 ]
机构
[1] Yokohama Coll Commerce, Dept Commerce, Yokohama, Kanagawa, Japan
[2] Control Syst Secur Ctr, Sendai, Miyagi, Japan
[3] Univ Elect Commun, Tokyo, Japan
来源
2020 59TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE) | 2020年
关键词
Industrial Protocol; Control System; Network Switch; WhiteList; SCADA; FIREWALL; SYSTEM;
D O I
10.23919/SICE48898.2020.9240340
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a control system, a network is often constructed because a central monitoring room monitors the status of control devices and sensors arranged in a wide area. Information from control devices and sensors is transmitted to the central monitoring room using a specific communication protocol. Therefore, many sensors and control devices can be accessed from outside by connecting to a system in the central monitoring room or via a computer in the central monitoring room. Attackers can take over control systems and gather information without the risk of physical intrusion. In order to avoid such vulnerabilities, it is necessary to introduce a defense method into the system, but it is difficult to introduce a system used in the information system due to the characteristics of the control system. We will examine the defense method considering the characteristics of the control system. In this paper, we focus on communications performed between control devices and sensors, and consider a white listing protection method that defines communications that are transferred by network switches. In particular, an object of the present invention is to protect against an attack due to connection of an unauthorized device and an attack for performing unauthorized communication from an authorized devices. In addition, in generating a white list, we discuss functions necessary to reduce the generation cost and management cost.
引用
收藏
页码:45 / 50
页数:6
相关论文
共 14 条
[1]   Flow whitelisting in SCADA networks [J].
Barbosa, Rafael Ramos Regis ;
Sadre, Ramin ;
Pras, Aiko .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2013, 6 (3-4) :150-158
[2]   Critical State-Based Filtering System for Securing SCADA Network Protocols [J].
Fovino, Igor Nai ;
Coletta, Alessio ;
Carcano, Andrea ;
Masera, Marcelo .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (10) :3943-3950
[3]   Modbus/DNP3 State-based Intrusion Detection System [J].
Fovino, Igor Nai ;
Carcano, Andrea ;
Murel, Thibault De lacheze ;
Trombetta, Alberto ;
Masera, Marcelo .
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, :729-736
[4]  
Jung WS, 2016, ASIA-PAC NETW OPER M
[5]  
Kang DH, 2014, INT CONF ADV COMMUN, P324, DOI 10.1109/ICACT.2014.6778974
[6]   Whitelist Generation Technique for Industrial Firewall in SCADA Networks [J].
Kang, Dong-Ho ;
Kim, Byoung-Koo ;
Na, Jung-Chan ;
Jhang, Kyoung-Sun .
FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 :525-534
[7]   SCADAWall: A CPI-enabled firewall model for SCADA security [J].
Li, Dong ;
Guo, Huaqun ;
Zhou, Jianying ;
Zhou, Luying ;
Wong, Jun Wen .
COMPUTERS & SECURITY, 2019, 80 :134-154
[8]  
Obermeier Sebastian, 2014, P IEEE EM TECHN FACT, P1
[9]  
Pareek Himanshu., 2012, International Journal of Computer Science, Engineering Information Technology, V2, P13, DOI DOI 10.5121/IJCSEIT.2012.2502
[10]   Case Studies of SCADA Firewall Configurations and the Implications for Best Practices [J].
Ranathunga, Dinesha ;
Roughan, Matthew ;
Nguyen, Hung ;
Kernick, Phil ;
Falkner, Nickolas .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2016, 13 (04) :871-884