A Survey of Industrial Control Systems Security
2011
Abstract
Industrial Control Systems (ICS) that monitor and operate critical industrial infrastructure worldwide are subject to an increasing frequency of cyber attacks. Evolution of the ICS environment to include standard operating system (OS) platforms and connectivity to corporate LANs and the world-wide-web occurred in ICS environments that were insulated from the outside world by a closed, trusted network. The result is legacy systems and component devices exposed to modern external threats with weak or non-existent security mechanisms in place. The risk to ICS is gradually being addressed, but not nearly fast enough to protect from easily devised cyber attacks.
References (27)
- Stouffer, Falco, Scarfone; "Guide to Industrial Control Systems (ICS) Security", NIST SP 800-82, 2011, http://csrc.nist.gov/publications/nistpubs/800-82/SP800-82-final.pdf
- Dept. of Homeland Security; "Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies", Control Systems Security Program, National Cyber Security Division, October 2009, http://www.us-cert.gov/control_systems/practices/documents /Defense_in_Depth_Oct09.pdf
- Weiss, Joseph, "Protecting Industrial Control Systems from Electronic Threats", Momentum Press, 2010, ISBN:1606501976 9781606501979.
- Khurana, Himanshu; "Moving beyond defense-in-depth to strategic resilience for critical control systems," Power and Energy Society General Meeting, 2011 IEEE , vol., no.,pp.1-3, 24-29 July 2011,doi: 10.1109/PES.2011.6039873. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=& arnumber=6039873&isnumber=6038815
- Sommestad, T.; Ericsson, G.N.; Nordlander, J.; , "SCADA system cyber security -A comparison of standards," Power and Energy Society General Meeting, 2010 IEEE , vol.,no., pp.1-8, 25-29 July 2010,doi: 10.1109/PES.2010.5590215. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=& arnumber=5590215&isnumber=5588047
- Zetter, Kim, "SCADA System's Hard-Coded Password Circulated Online for Years",July 19, 2010, http://www.wired.com/threatlevel/2010/07/siemens-scada/
- Zetter, Kim, "Attack Code for SCADA Vulnerabilities Released Online", March 22,2011, http://www.wired.com/threatlevel/2011/03/scada-vulnerabilities/
- Hentea, Mariana, "Improving Security for SCADA Control Systems", Interdisciplinary Journal of Information, Knowledge, and Management, Volume 3, 2008, http://ijikm.org/Volume3 /IJIKMv3p073-086Hentea361.pdf
- Mills, Elinor, "Researchers Warn of SCADA Equipment Discoverable via Google", CNET News, August 2, 2011, http://news.cnet.com/8301-27080_3-20087201-245/researchers-warn-of-scada-equipment- discoverable-via-google/
- Shiels, Maggie; "Cyber War Threat Exaggerated Claims Security Expert", BBCTechnology News, February 2011, http://www.bbc.co.uk/news/technology-12473809
- Brito, Jeremy, Watkins, Tate; "Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy", Mercatus Center, George Mason University, April2011, http://mercatus.org /publication/loving-cyber-bomb-dangers-threat-inflation-cybersecurity-policy A Survey of Industrial Control Systems Security http://www.cse.wustl.edu/~jain/cse571-11/ftp/ics/index.html
- Johnson, R.E.; , "Survey of SCADA security challenges and potential attack vectors," Internet Technology and Secured Transactions (ICITST), 2010 International Conference for, vol., no., pp.1-5, 8-11 Nov. 2010. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5678102&isnumber=5678008
- Kiuchi, M.; Serizawa, Y.; , "Security technologies, usage and guidelines in SCADA system networks," ICCAS-SICE, 2009 , vol., no., pp.4607-4612, 18-21 Aug. 2009. http://ieeexplore.ieee.org/stamp /stamp.jsp?tp=&arnumber=5333009&isnumber=5332438
- "Conficker infected critical hospital equipment", April 2009, http://www.electricityforum.com/news/apr09/Confickerinfectedcriticalequipment.html
- Falco, Joe, et al., "Using Host-based Anti-virus Software on Industrial Control Systems: Integration Guidance and a Test Methodology for Assessing Performance Impacts", NIST SP 1058, 2006. http://www.uscert.gov/control_systems/practices/pcsf/groups/d/1177076007-nist_sp1058.pdf
- D. Maynor and R. Graham. "SCADA Security and Terrorism: We're Not Crying Wolf",2006, http://www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Maynor-Graham-up.pdf
- McMillan, Robert, "Siemens: Stuxnet worm hit industrial systems", ComputerWorld, September 14, 2010. http://www.computerworld.com/s/article/print/9185419
- /Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyName=Network+Security&taxonomyId=142 [ICS-CERT11] U.S. Dept. of Homeland Security, "SCADA Hacking Using Internet Search Engines", * Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT) Monthly Monitor, October 2011, http://www.us-cert.gov/control_systems/pdf/ICS-CERT_Monthly_Monitor_Oct2011.pdf
- Solum, Martin, "Quickdraw Retrospective, Part #1," Digital Bond, November 17, 2009, http://www.digitalbond.com/2009/11/17/quickdraw-retrospective-part-1/; "Quickdraw Retrospective, Part #2," Digital Bond, November 19, 2009, http://www.digitalbond.com/2009/11/19/quickdraw-retrospective- part-2/;
- Gorman, Siobhan, "Electricity Grid in U.S. Penetrated By Spies", Wall Street Journal, Technology, 04 April 2009, http://online.wsj.com/article/SB123914805204099085.html
- Ning Cai; Jidong Wang; Xinghuo Yu; , "SCADA system security: Complexity, history and new developments", Industrial Informatics, 2008. INDIN 2008. 6th IEEE International Conference on , vol., no., pp.569-574, 13-16 July 2008, doi: 10.1109/INDIN.2008.4618165. http://ieeexplore.ieee.org.libproxy.wustl.edu/stamp/stamp.jsp?tp=&arnumber=4618165
- Dong Wei; Yan Lu; Jafari, M.; Skare, P.; Rohde, K.; , "An integrated security system of protecting Smart Grid against cyber attacks, Innovative Smart Grid Technologies (ISGT), 2010 , vol., no., pp.1-7, 19-21
- Jan. 2010,doi: 10.1109/ISGT.2010.5434767. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=& arnumber=5434767&isnumber=5434721
- Creery, A.A.; Byres, E.J.; "Industrial cybersecurity for a power system and SCADA networks - Be secure", Industry Applications Magazine, IEEE, vol.13, no.4.pp.49-55, July-Aug. 2007. doi: 10.1109/MIA.2007.4283509. http://ieeexplore.ieee.org.libproxy.wustl.edu/stamp/stamp.jsp?tp=& arnumber=4283509&isnumber=4283495
- Schachtman, Noah, "Exclusive: Computer Virus Hits U.S. Drone Fleet", October 7,2011, http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/ DCOM..........Distributed Common Object Model DCS..............Distributed Control Systems DHS..............U.S. Department of Homeland Security DMZ.............Demilitarized Zone DNP..............Distributed Network Protocol A Survey of Industrial Control Systems Security http://www.cse.wustl.edu/~jain/cse571-11/ftp/ics/index.html
- DoS...............Denial-of-Service attack HMI..............Human Machine Interface ICS................Industrial Control Systems ICS-CERT....Industrial Control Systems Cyber Emergency Response Team IDS................Intrusion Detection Systems IED................Intelligent Electronic Devices IP ..................Internet Protocol IT ..................Information Technology LAN...............Local Area Network LDoS.............Low-rate Denial-of-Service attack NIST..............National Institute of Standards and Technology OPC...............Object Linking and Embedding for Process Control PLC................Programmable Logic Controllers RTU...............Remote Terminal Unit SCADA..........Supervisory Control and Data Acquisition Systems SIEM..............Security Information and Event Management Date Last Modified: 12/08/2011
- This and other papers on latest advances in network security are available on line at: http://www1.cse .wustl.edu/~jain/cse571-11/index.html Back to Raj Jain's Home Page