Securing connection between IT and OT: the Fog Intrusion Detection System prospective

被引:0
作者
Colelli, Riccardo [1 ]
Panzieri, Stefano [1 ]
Pascucci, Federica [1 ]
机构
[1] Univ Roma Tre, Dept Engn, Rome, Italy
来源
2019 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 AND INTERNET OF THINGS (METROIND4.0&IOT) | 2019年
关键词
Cybersecurity; Intrusion Detection System; Industrial Internet of Things; Fog Computing; New Implementation Approaches; Industrial Informatics; MODEL;
D O I
10.1109/metroi4.2019.8792884
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Industrial Control systems traditionally achieved security by using proprietary protocols to communicate in an isolated environment from the outside. This paradigm is changed with the advent of the Industrial Internet of Things that foresees flexible and interconnected systems. In this contribution, a device acting as a connection between the operational technology network and information technology network is proposed. The device is an intrusion detection system related to legacy systems that is able to collect and reporting data to and from industrial IoT devices. It is based on the common signature based intrusion detection system developed in the information technology domain, however, to cope with the constraints of the operation technology domain, it exploits anomaly based features. Specifically, it is able to analyze the traffic on the network at application layer by mean of deep packet inspection, parsing the information carried by the proprietary protocols. At a later stage, it collect and aggregate data from and to IoT domain. A simple set up is considered to prove the effectiveness of the approach.
引用
收藏
页码:444 / 448
页数:5
相关论文
共 16 条
  • [1] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [2] Antiy Labs, 2010, REP WORM STUXN ATT
  • [3] Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
  • [4] Fog and IoT: An Overview of Research Opportunities
    Chiang, Mung
    Zhang, Tao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06): : 854 - 864
  • [5] Colelli R, 2018, IEEE INT C EMERG, P1171, DOI 10.1109/ETFA.2018.8502495
  • [6] Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
    Corona, Igino
    Giacinto, Giorgio
    Roli, Fabio
    [J]. INFORMATION SCIENCES, 2013, 239 : 201 - 225
  • [7] E-ISAC, 2016, Analysis of the cyber attack on the ukrainian power grid
  • [8] Escudero C, 2018, IEEE INT C EMERG, P605, DOI 10.1109/ETFA.2018.8502585
  • [9] Jiang N, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (IEEE ICIA 2017), P523, DOI 10.1109/ICInfA.2017.8078963
  • [10] Kodali R K, 2017, TENSYMP 2017 IEEE IN, P1, DOI DOI 10.1109/TENCONSPRING.2017.8070095