AN INCIDENT RESPONSE MODEL FOR INDUSTRIAL CONTROL SYSTEM FORENSICS BASED ON HISTORICAL EVENTS

被引:1
作者
Yau, Ken [1 ]
Chow, Kam-Pui [1 ]
Yiu, Siu-Ming [1 ]
机构
[1] Univ Hong Kong, Comp Sci, Hong Kong, Peoples R China
来源
CRITICAL INFRASTRUCTURE PROTECTION XIII | 2019年 / 570卷
关键词
Industrial control systems; incident response; forensics;
D O I
10.1007/978-3-030-34647-8_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber attacks on industrial control systems are increasing. Malware such as Stuxnet, Havex and BlackEnergy have demonstrated that industrial control systems are attractive targets for attackers. However, industrial control systems are not limited to malware attacks. Other attacks include SQL injection, distributed denial-of-service, spear phishing, social engineering and man-in-the-middle attacks. Additionally, methods such as unauthorized access, brute forcing and insider attacks have also targeted industrial control systems. Accidents such as fires and explosions at industrial plants also provide valuable insights into the targets of attacks, failure methods and potential impacts. This chapter presents an incident response model for industrial control system forensics based on historical events. In particular, representative industrial control system incidents - cyber attacks and accidents - that have occurred over the past 25 years are categorized and analyzed. The resulting incident response model is useful for forensic planning and investigations. The model enables incident response teams and forensic investigators to decide on the expertise, techniques and tools to be applied to ensure sound evidence acquisition, analysis and reporting.
引用
收藏
页码:311 / 328
页数:18
相关论文
共 24 条
  • [1] Abbasi A., 2016, BLACK HAT EUR
  • [2] Aloui N.B., 2015, Industrial control systems dynamic code injection
  • [3] [Anonymous], 2011, GUIDE IND CONTROL SY
  • [4] [Anonymous], 2017, RTHK NEWS 0325
  • [5] Carr N., 2014, THESIS
  • [6] Cornelius E., 2008, INLEXT0814231
  • [7] Dar A., 2017, CYBERBIT BLOG 0210
  • [8] Dzwiarek Marek, 2004, Int J Occup Saf Ergon, V10, P129
  • [9] Eden P., 2015, 3rd International Symposium for ICS SCADA Cyber Security Research 2015 (ICS-CSR 2015), V3, P42
  • [10] Falliere N., 2011, W32. Stuxnet Dossier, V5, P29