A HOST-BASED SECURITY ASSESSMENT ARCHITECTURE FOR INDUSTRIAL CONTROL SYSTEMS

被引:0
|
作者
Rakshit, Abhishek [1 ]
Ou, Xinming [1 ]
机构
[1] Kansas State Univ, Dept Comp & Informat Sci, Manhattan, KS 66506 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computerized control systems perform vital functions across many critical infrastructures throughout the nation. These systems can be vulnerable to a variety of attacks leading to devastating consequences like loss of production, interruption in distribution of public utilities and most importantly endangering public safety. This calls for an approach to halt attacks in their tracks before being able to do any harm to these systems. Vulnerability assessment performed on these systems can identify and assess potential vulnerabilities in a control system network, before they are exploited by malicious intruders. An effective vulnerability assessment architecture should assimilate security knowledge from multiple sources to uncover all the vulnerabilities present on a host. Legitimate concerns arise since host-based security scanners typically need to run at administrative privileges, and takes input from external knowledge sources for the analysis making it imperative that the scanner be trustworthy. Intentionally or otherwise, ill-formed input may compromise the scanner and the whole system if the scanner is susceptible to, or carries one or more vulnerability itself. We have implemented the scanning architecture in the context of an enterprise-level security analyzer. The analyzer finds security vulnerabilities present on a host according to the third-party security knowledge specified in Open Vulnerability Assessment Language(OVAL). This paper presents an architecture where a host-based security scanner's code base can be minimized to an extent where its correctness can be verified by adequate vetting. Moreover, the architecture also allows for leveraging third-party security knowledge efficiently and supports various higher-level security analysis.
引用
收藏
页码:7 / 12
页数:6
相关论文
共 50 条
  • [1] Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things
    Nallakaruppan, M. K.
    Somayaji, Siva Rama Krishnan
    Fuladi, Siddhesh
    Benedetto, Francesco
    Ulaganathan, Senthil Kumaran
    Yenduri, Gokul
    IEEE ACCESS, 2024, 12 : 31788 - 31797
  • [2] Development of a Host-Based Intrusion Detection and Control Device for Industrial Field Control Devices
    Rice, Theora R.
    Seppala, Garret
    Edgar, Thomas
    Choi, Eric
    Cain, Daniel
    Mahserejian, Shant
    2019 RESILIENCE WEEK (RWS), 2019, : 105 - 111
  • [3] NETWORK SECURITY ANALYSIS BASED ON HOST-BASED ATTACK GRAPH
    Zhong, Shangqin
    Yao, Wenbin
    Ge, Haihui
    Yang, Yixian
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 88 - +
  • [4] Host-Based Security Sensor Integrity in Multiprocessing Environments
    McEvoy, Thomas Richard
    Wolthusen, Stephen D.
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 138 - 152
  • [5] Protection architecture of endogenous safety and security for industrial control systems
    Yaozhong Xin
    SecurityandSafety, 2023, 2 (03) : 20 - 28
  • [6] Host-based imaging duels dedicated systems
    Byerly, M
    LASER FOCUS WORLD, 1996, 32 (03): : 153 - 156
  • [7] A review of security assessment methodologies in industrial control systems
    Qassim, Qais Saif
    Jamil, Norziana
    Daud, Maslina
    Patel, Ahmed
    Ja'affar, Norhamadi
    INFORMATION AND COMPUTER SECURITY, 2019, 27 (01) : 47 - 61
  • [8] Security assessment for industrial control systems based on fuzzy analytic hierarchy process
    Jia C.-Q.
    Feng D.-Q.
    Feng, Dong-Qin (dqfeng@iipc.zju.edu.cn), 1600, Zhejiang University (50): : 759 - 765
  • [9] Effective reporting (ER) for mobile host-based security and forensics
    Jacoby, Grant A.
    Ransbottom, J. Scot
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 269 - 274
  • [10] Host-Based Security Challenges and Controls: A Survey of Contemporary Research
    Price, Sean M.
    INFORMATION SECURITY JOURNAL, 2008, 17 (04): : 170 - 178