ABSTRACT
With the discovery of the Stuxnet malware in June 2010, Industrial Control System (ICS) security has gained global attention and scrutiny. Due to the unique industrial control operating environment, standard information technology host-based defenses such as operating system upgrades are not always feasible. Therefore, ICS security strategies must rely upon layered network infrastructure and enclave boundary defenses. As ICS threats evolve, so too must ICS security practices and strategies. ICS security innovation rely upon understanding the effectiveness of established defenses and countermeasures. In an effort to evaluate the security effectiveness of ICS layered perimeter defenses, a Red Team security assessment was conducted on an ICS test network. This experiment offers insight to the effectiveness of ICS perimeter defenses by demonstrating the reduction of attack vectors, decreased adversarial network access, and perimeter network defenses are an effective ICS security strategy.
- Falliere, N., O Murchu, L., and Chien, E., 2011. W32.Stuxnet Dossier v1.4. Symantec Security Response.Google Scholar
- Higgins, K.J., 2016. Shades of Stuxnet Spotted in Newly Found ICS/SCADA Malware Information Week Dark Reading.Google Scholar
- Macaulay, T. and Singer, B., 2012. Cybersecurity for Industrial Control Systems. CRC Press Taylor & Francis Group, Boca Raton, Florida. Google ScholarDigital Library
- Mcafee Professional Services and Mcafee Labs, 2011. Global Energy Cyberattacks: "Night Dragon".Google Scholar
- Miller, B. and Rowe, D., 2012. A survey SCADA of and critical infrastructure incidents. In Proceedings of the Proceedings of the 1st Annual conference on Research in information technology (Calgary, Alberta, Canada2012), ACM, 2380805, 51--56. DOI= http://dx.doi.org/10.1145/2380790.2380805. Google ScholarDigital Library
- ODVA, 2015. Open Devicenet Vendors Association.Google Scholar
- Rockwell Automation, 2013. Artilce 29402 - TCP/UDP Ports Used by Rockwell Automation Products Rockwell Automation.Google Scholar
- Stouffer, K.A., Falco, J.A., and Scarfone, K.A., 2011. SP 800--82. Guide to Industrial Control Systems (ICS) Security. National Institute of Standards & Technology.Google Scholar
- Symantec Security Response, 2014. Dragonfly: Cyberespionage Attacks Against Energy Suppliers, Symantec Corporation.Google Scholar
Index Terms
- Security Assessment of Industrial Control Supervisory and Process Control Zones
Recommendations
Cyber In-security of Industrial Control Systems: A Societal Challenge
SAFECOMP 2015: Proceedings of the 34th International Conference on Computer Safety, Reliability, and Security - Volume 9337Our society and its citizens increasingly depend on the undisturbed functioning of critical infrastructures CI, their products and services. Many of the CI services as well as other organizations use Industrial Control Systems ICS to monitor and control ...
Investigation of Cyber Attacks on a Water Distribution System
Applied Cryptography and Network Security WorkshopsAbstractA Cyber Physical System (CPS) consists of cyber components for computation and communication, and physical components such as sensors and actuators for process control. These components are networked and interact in a feedback loop. CPS are found ...
Comments