Publication detail

Improving security in SCADA systems through firewall policy analysis

RYŠAVÝ, O. RÁB, J. ŠVÉDA, M.

Original Title

Improving security in SCADA systems through firewall policy analysis

English Title

Improving security in SCADA systems through firewall policy analysis

Type

conference paper

Language

en

Original Abstract

Many of modern SCADA networks are connected to both the company's enterprise network and the Internet. Because these industrial systems often control critical processes the cyber- security requirements become a priority for their design. This paper deals with network communication security in SCADA environment implemented by firewall devices. We proposed a method for verification of firewall configurations against security policy to detect and reveal potential holes in implemented rule sets. We present a straightforward verification method based on representation of a firewall configuration as a set of logical formulas suitable for automated analysis using SAT tools. We demonstrate how such configuration can be analyzed for security policy violation that can be inferred from security policy specification of an industrial automation system. 

English abstract

Many of modern SCADA networks are connected to both the company's enterprise network and the Internet. Because these industrial systems often control critical processes the cyber- security requirements become a priority for their design. This paper deals with network communication security in SCADA environment implemented by firewall devices. We proposed a method for verification of firewall configurations against security policy to detect and reveal potential holes in implemented rule sets. We present a straightforward verification method based on representation of a firewall configuration as a set of logical formulas suitable for automated analysis using SAT tools. We demonstrate how such configuration can be analyzed for security policy violation that can be inferred from security policy specification of an industrial automation system. 

Keywords

SCADA, network firewalls, network security, network policy, SAT/SMT, firewall rule based analysis

RIV year

2013

Released

08.09.2013

Publisher

IEEE Computer Society

Location

Krakow

ISBN

978-1-4673-4471-5

Book

Proceedings of the Federated Conference on Computer Science and Information Systems

Edition

NEUVEDEN

Edition number

NEUVEDEN

Pages from

1435

Pages to

1440

Pages count

6

URL

Documents

BibTex


@inproceedings{BUT103524,
  author="Ondřej {Ryšavý} and Jaroslav {Ráb} and Miroslav {Švéda}",
  title="Improving security in SCADA systems through firewall policy analysis",
  annote="Many of modern SCADA networks are connected to both the company's enterprise
network and the Internet. Because these industrial systems often control critical
processes the cyber- security requirements become a priority for their design. 

This paper deals with network communication security in SCADA environment
implemented by firewall devices. We proposed a method for verification of
firewall configurations against security policy to detect and reveal potential
holes in implemented rule sets. We present a straightforward verification method
based on representation of a firewall configuration as a set of logical formulas
suitable for automated analysis using SAT tools. We demonstrate how such
configuration can be analyzed for security policy violation that can be inferred
from security policy specification of an industrial automation system. ",
  address="IEEE Computer Society",
  booktitle="Proceedings of the Federated Conference on Computer Science and Information Systems",
  chapter="103524",
  edition="NEUVEDEN",
  howpublished="electronic, physical medium",
  institution="IEEE Computer Society",
  year="2013",
  month="september",
  pages="1435--1440",
  publisher="IEEE Computer Society",
  type="conference paper"
}