Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems

被引:26
作者
Awad, Rima Asmar [1 ]
Beztchi, Saeed [2 ]
Smith, Jared M. [2 ]
Lyles, Bryan [3 ]
Prowell, Stacy [3 ]
机构
[1] Tennessee Technol Univ, Oak Ridge Natl Lab, Cookeville, TN 38505 USA
[2] Univ Tennessee, Oak Ridge Natl Lab, Knoxville, TN USA
[3] Oak Ridge Natl Lab, Oak Ridge, TN USA
来源
4TH ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2018) | 2018年
关键词
SCADA; ICS; Digital Forensics; Survey; NETWORK FORENSICS; ACQUISITION;
D O I
10.1145/3295453.3295454
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security aspects of SCADA environments and the systems within are increasingly a center of interest to researchers and security professionals. As the rise of sophisticated and nation-state malware targeting such systems flourishes, traditional digital forensics tools struggle to transfer the same capabilities to systems lacking typical volatile memory primitives, monitoring software, and the compatible operating-system primitives necessary for conducting forensic investigations. Even worse, SCADA systems are typically not designed and implemented with security in mind, nor were they purpose-built to monitor and record system data at the granularity associated with traditional IT systems. Rather, these systems are often built to control field devices and drive industrial processes. More succinctly, SCADA systems were not designed with a primary goal of interacting with the digital world. Consequently, forensics investigators well-versed in the world of digital forensics and incident response face an array of challenges that prevent them from conducting effective forensic investigation in environments with vast amounts of critical infrastructure. In order to bring SCADA systems within the reach of the armies of digital forensics professionals and tooling already available, both researchers and practitioners need a guide to the current state-of-the-art techniques, a road-map to the challenges lying on the path forward, and insight into the future directions R&D must move towards. To that end, this paper presents a survey into the literature on digital forensics applied to SCADA systems. We cover not only the challenges to applying digital forensics to SCADA like most other reviews, but also the range of proposed frameworks, methodologies, and actual implementations in literature.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 46 条
  • [1] Adhikari Uttam., 2017, IEEE Transactions on Smart Grid, P1
  • [2] Programmable Logic Controller Forensics
    Ahmed, Irfan
    Obermeier, Sebastian
    Sudhakaran, Sneha
    Roussev, Vassil
    [J]. IEEE SECURITY & PRIVACY, 2017, 15 (06) : 18 - 24
  • [3] SCADA Systems: Challenges for Forensic Investigators
    Ahmed, Irfan
    Obermeier, Sebastian
    Naedele, Martin
    Richard, Golden G., III
    [J]. COMPUTER, 2012, 45 (12) : 44 - 51
  • [4] Betts M., 2016, INT C INF SEC CYB FO
  • [5] Forensic imaging of embedded systems using JTAG (boundary-scan)
    Breeuwsma, MF
    [J]. DIGITAL INVESTIGATION, 2006, 3 (01) : 32 - 42
  • [6] Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
    Cardenas, Alvaro A.
    Roosta, Tanya
    Sastry, Shankar
    [J]. AD HOC NETWORKS, 2009, 7 (08) : 1434 - 1447
  • [7] ENHANCING THE SECURITY AND FORENSIC CAPABILITIES OF PROGRAMMABLE LOGIC CONTROLLERS
    Chan, Chun-Fai
    Chow, Kam-Pui
    Yiu, Siu-Ming
    Yau, Ken
    [J]. ADVANCES IN DIGITAL FORENSICS XIV, 2018, 532 : 351 - 367
  • [8] FORENSIC ANALYSIS OF A SIEMENS PROGRAMMABLE LOGIC CONTROLLER
    Chan, Raymond
    Chow, Kam-Pui
    [J]. CRITICAL INFRASTRUCTURE PROTECTION X, 2016, 485 : 117 - 130
  • [9] Chandia R, 2008, INT FED INFO PROC, V253, P117
  • [10] Dell Threat Intelligence Team, 2013, WIP MALW THREAT AN