On the Analysis of Vulnerability Chains in Industrial Networks

被引:5
作者
Cheminod, Manuel [1 ]
Bertolotti, Ivan Cibrario [1 ]
Durante, Luca [1 ]
Valenzano, Adriano [1 ]
机构
[1] CNR, IEIIT, I-00185 Rome, Italy
来源
WFCS 2008: IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS, PROCEEDINGS | 2008年
关键词
D O I
10.1109/WFCS.2008.4638740
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ever-increasing adoption at the factory field level of COTS (Commercial Off-The-Shelf) hardware and software to host both real-time control tasks and a general-purpose operating system on the same machine is profoundly influencing the extent of threats that a factory network and computing infrastructure shall be prepared to deal with. In fact, these machines share with their office automation counterparts the same kinds of vulnerabilities and, being often interconnected to computers providing services to the public, are prone to cyber-attacks. In this paper, the architecture and use of a software toot able to analyse a factory network for vulnerabilities are described. Automating the analysis is of outmost importance because, as the complexity, of the network grows, the problem rapidly becomes hard to tackle by hand due to the subtle interactions that may occur among apparently unrelated vulnerabilities.
引用
收藏
页码:215 / 224
页数:10
相关论文
共 21 条
[11]  
NIST, COMM WEAKN EN CWE
[12]  
NIST, National vulnerability database
[13]  
Ou XM, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P113
[14]  
Ramakrishnan C. R., 2002, Journal of Computer Security, V10, P189
[15]   Using model checking to analyze network vulnerabilities [J].
Ritchey, RW ;
Ammann, P .
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, :156-165
[16]  
Sheyner O, 2003, LECT NOTES COMPUT SC, V3188, P344
[17]  
SHOOMAN M, 1990, PROBABILISTIC RELIAB
[18]  
*SIEM, WINAC
[19]  
Sufatrio, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTEENTH LARGE INSTALLATION SYSTEM ADMINISTRATION CONFERENCE, P47
[20]  
Yaghmour K., 2001, ADAPTIVE DOMAIN ENV