skip to main content
10.1145/2978192.2978219acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Security Assessment of Industrial Control Supervisory and Process Control Zones

Published:28 September 2016Publication History

ABSTRACT

With the discovery of the Stuxnet malware in June 2010, Industrial Control System (ICS) security has gained global attention and scrutiny. Due to the unique industrial control operating environment, standard information technology host-based defenses such as operating system upgrades are not always feasible. Therefore, ICS security strategies must rely upon layered network infrastructure and enclave boundary defenses. As ICS threats evolve, so too must ICS security practices and strategies. ICS security innovation rely upon understanding the effectiveness of established defenses and countermeasures. In an effort to evaluate the security effectiveness of ICS layered perimeter defenses, a Red Team security assessment was conducted on an ICS test network. This experiment offers insight to the effectiveness of ICS perimeter defenses by demonstrating the reduction of attack vectors, decreased adversarial network access, and perimeter network defenses are an effective ICS security strategy.

References

  1. Falliere, N., O Murchu, L., and Chien, E., 2011. W32.Stuxnet Dossier v1.4. Symantec Security Response.Google ScholarGoogle Scholar
  2. Higgins, K.J., 2016. Shades of Stuxnet Spotted in Newly Found ICS/SCADA Malware Information Week Dark Reading.Google ScholarGoogle Scholar
  3. Macaulay, T. and Singer, B., 2012. Cybersecurity for Industrial Control Systems. CRC Press Taylor & Francis Group, Boca Raton, Florida. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Mcafee Professional Services and Mcafee Labs, 2011. Global Energy Cyberattacks: "Night Dragon".Google ScholarGoogle Scholar
  5. Miller, B. and Rowe, D., 2012. A survey SCADA of and critical infrastructure incidents. In Proceedings of the Proceedings of the 1st Annual conference on Research in information technology (Calgary, Alberta, Canada2012), ACM, 2380805, 51--56. DOI= http://dx.doi.org/10.1145/2380790.2380805. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. ODVA, 2015. Open Devicenet Vendors Association.Google ScholarGoogle Scholar
  7. Rockwell Automation, 2013. Artilce 29402 - TCP/UDP Ports Used by Rockwell Automation Products Rockwell Automation.Google ScholarGoogle Scholar
  8. Stouffer, K.A., Falco, J.A., and Scarfone, K.A., 2011. SP 800--82. Guide to Industrial Control Systems (ICS) Security. National Institute of Standards & Technology.Google ScholarGoogle Scholar
  9. Symantec Security Response, 2014. Dragonfly: Cyberespionage Attacks Against Energy Suppliers, Symantec Corporation.Google ScholarGoogle Scholar

Index Terms

  1. Security Assessment of Industrial Control Supervisory and Process Control Zones

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGITE '16: Proceedings of the 17th Annual Conference on Information Technology Education
      September 2016
      188 pages
      ISBN:9781450344524
      DOI:10.1145/2978192

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 September 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SIGITE '16 Paper Acceptance Rate26of67submissions,39%Overall Acceptance Rate176of429submissions,41%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader