Integrated protection of industrial control systems from cyber-attacks: the ATENA approach

被引:24
作者
Adamsky, F. [1 ]
Aubigny, M. [2 ]
Battisti, F. [3 ]
Carli, M. [3 ]
Cimorelli, F. [4 ]
Cruz, T. [5 ]
Di Giorgio, A. [4 ]
Foglietta, C. [3 ]
Galli, A. [6 ]
Giuseppi, A. [4 ]
Liberati, F. [4 ]
Neri, A. [3 ]
Panzieri, S. [3 ]
Pascucci, F. [3 ]
Proenca, J. [5 ]
Pucci, P. [6 ]
Rosa, L. [5 ]
Soua, R. [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, Luxembourg, Luxembourg
[2] Itrust Consulting, Luxembourg, Luxembourg
[3] Roma Tre Univ, Dept Engn, Rome, Italy
[4] CRAT, Rome, Italy
[5] Univ Coimbra, Ctr Informat & Syst, Coimbra, Portugal
[6] Leonardo SpA, Rome, Italy
基金
欧盟地平线“2020”;
关键词
Critical infrastructures; Cyber-physical attacks; IACS; Industrial IoT; SCADA systems; Industrial and automation control systems; CRITICAL INFRASTRUCTURE; TOOLS;
D O I
10.1016/j.ijcip.2018.04.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial and Automation Control systems traditionally achieved security thanks to the use of proprietary protocols and isolation from the telecommunication networks. Nowadays, the advent of the Industrial Internet of Things poses new security challenges. In this paper, we first highlight the main security challenges that advocate for new risk assessment and security strategies. To this end, we propose a security framework and advanced tools to properly manage vulnerabilities, and to timely react to the threats. The proposed architecture fills the gap between computer science and control theoretic approaches. The physical layers connected to Industrial Control Systems are prone to disrupt when facing cyber-attacks. Considering the modules of the proposed architecture, we focus on the development of a practical framework to compare information about physical faults and cyber-attacks. This strategy is implemented in the ATENA architecture that has been designed as an innovative solution for the protection of critical assets. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:72 / 82
页数:11
相关论文
共 33 条
[1]  
Ahemd M., 2017, P INT C COMM TECHN, P104
[2]  
Alcaraz C., 2012, SECURITY ASPECTS SCA
[3]  
[Anonymous], 2007, 4765 RFC
[4]  
ATENA Consortium, 2016, ATENA ADV TOOLS ASSE
[5]   Improving Resilience of Interdependent Critical Infrastructures via an on-line Alerting System [J].
Capodieci, P. ;
Diblasi, S. ;
Ciancamerla, E. ;
Minichino, M. ;
Foglietta, C. ;
Lefevre, D. ;
Oliva, G. ;
Panzieri, S. ;
Setola, R. ;
De Porcellinis, S. ;
Priscoli, F. Delli ;
Castrucci, M. ;
Suraci, V. ;
Lev, L. ;
Shneck, Y. ;
Khadraoui, D. ;
Aubert, J. ;
Iassinovski, S. ;
Jiang, J. ;
Simoes, P. ;
Caldeira, F. ;
Spronska, A. ;
Harpes, C. ;
Aubigny, M. .
2010 COMPLEXITY IN ENGINEERING: COMPENG 2010, PROCEEDINGS, 2010, :88-90
[6]  
Chattopadhyay A, 2017, DES AUT TEST EUROPE, P1104, DOI 10.23919/DATE.2017.7927154
[7]   Review of Security Issues in Industrial Networks [J].
Cheminod, Manuel ;
Durante, Luca ;
Valenzano, Adriano .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) :277-293
[8]   A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems [J].
Cruz, Tiago ;
Rosa, Luis ;
Proenca, Jorge ;
Maglaras, Leandros ;
Aubigny, Matthieu ;
Lev, Leonid ;
Jiang, Jianmin ;
Simoes, Paulo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (06) :2236-2246
[9]  
Cruz T, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P878, DOI 10.1109/INM.2015.7140399
[10]  
Danyliw R., 2007, RFC 5070 INCIDENT OB