A Heterogeneous Redundant Architecture for Industrial Control System Security

被引:0
作者
Dai, Zhihao [1 ]
Leeke, Matthew [1 ]
Ding, Yulong [2 ,3 ]
Yang, Shuang-Hua [2 ,3 ]
机构
[1] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, England
[2] Southern Univ Sci & Technol, Shenzhen Key Lab Safety & Secur Next Generat Ind, Shenzhen 518055, Peoples R China
[3] Southern Univ Sci & Technol, Dept Comp Sci & Engn, Shenzhen 518055, Peoples R China
来源
2022 IEEE 27TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC) | 2022年
基金
中国国家自然科学基金;
关键词
Industrial Control System; Security; Redundancy; Programmable Logic Controller; Machine Learning; FRAMEWORK; TOLERANT; SCADA;
D O I
10.1109/PRDC55274.2022.00023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Component-level heterogeneous redundancy is gaining popularity as an approach for preventing single-point security breaches in Industrial Control Systems (ICSs), especially with regard to core components such as Programmable Logic Controllers (PLCs). To take control of a system with componentlevel heterogeneous redundancy, an adversary must uncover and concurrently exploit vulnerabilities across multiple versions of hardened components. As such, attackers incur increased costs and delays when seeking to launch a successful attack. Existing approaches advocate attack resilience via pairwise comparison among outputs from multiple PLCs. These approaches incur increased resource costs due to them having a high degree of redundancy and do not address concurrent attacks. In this paper we address both issues, demonstrating a data-driven component selection approach that achieves a trade-off between resources cost and security. In particular, we propose (i) a novel dual-PLC ICS architecture with native pairwise comparison which can offer limited yet comparable defence against single-point breaches, (ii) a machine-learning based selection mechanisms which can deliver resilience against non-concurrent attacks under resource constraints, (iii) a scaled up variant of the proposed architecture to counteract concurrent attacks with modest resource implications.
引用
收藏
页码:89 / 97
页数:9
相关论文
共 43 条
  • [1] Aggarwal C. C., 2016, Outlier analysis, V2nd
  • [2] [Anonymous], 2017, ESET
  • [3] [Anonymous], 2012, J BRAZILIAN COMPUTER
  • [4] The Multiple Facets of Software Diversity: Recent Developments in Year 2000 and Beyond
    Baudry, Benoit
    Monperrus, Martin
    [J]. ACM COMPUTING SURVEYS, 2015, 48 (01)
  • [5] Cardenas A., 2008, P USENIX C HOT TOP S, P1, DOI [10.5555/1496671.1496677, DOI 10.5555/1496671.1496677]
  • [6] Lessons from Stuxnet
    Chen, Thomas M.
    Abu-Nimeh, Saeed
    [J]. COMPUTER, 2011, 44 (04) : 91 - 93
  • [7] Mitigating Sensor Attacks Against Industrial Control Systems
    Combita, Luis F.
    Cardenas, Alvaro A.
    Quijano, Nicanor
    [J]. IEEE ACCESS, 2019, 7 : 92444 - 92455
  • [8] A Malware-Tolerant, Self-Healing Industrial Control System Framework
    Denzel, Michael
    Ryan, Mark
    Ritter, Eike
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 46 - 60
  • [9] Ellison R.J., 1997, SURVIVABLE NETWORK S
  • [10] Falliere N., 2011, W32 . Stuxnet Dossier, V5, P29