Publication detail

Developing Battery of Vulnerability Tests for Industrial Control Systems

FUJDIAK, R. BLAŽEK, P. MLÝNEK, P. MIŠUREC, J.

Original Title

Developing Battery of Vulnerability Tests for Industrial Control Systems

English Title

Developing Battery of Vulnerability Tests for Industrial Control Systems

Type

conference paper

Language

en

Original Abstract

Nowadays, the industrial control systems (ICS) face many challenges, where security is becoming one of the most crucial. This fact is caused by new connected environment, which brings among new possibilities also new vulnerabilities, threats, or possible attacks. The criminal acts in the ICS area increased over the past years exponentially, which caused the loss of billions of dollars. This also caused classical Intrusion Detection Systems and Intrusion Prevention Systems to evolve in order to protect among IT also ICS networks. However, these systems need sufficient data such as traffic logs, protocol information, attack patterns, anomaly behavior marks and many others. To provide such data, the requirements for the test environment are summarized in this paper. Moreover, we also introduce more than twenty common vulnerabilities across the ICS together with information about possible risk, attack vector (point), possible detection methods and communication layer occurrence. Therefore, the paper might be used as a base-ground for building sufficient data generator for machine learning and artificial intelligence algorithms often used in ICS/IDS systems.

English abstract

Nowadays, the industrial control systems (ICS) face many challenges, where security is becoming one of the most crucial. This fact is caused by new connected environment, which brings among new possibilities also new vulnerabilities, threats, or possible attacks. The criminal acts in the ICS area increased over the past years exponentially, which caused the loss of billions of dollars. This also caused classical Intrusion Detection Systems and Intrusion Prevention Systems to evolve in order to protect among IT also ICS networks. However, these systems need sufficient data such as traffic logs, protocol information, attack patterns, anomaly behavior marks and many others. To provide such data, the requirements for the test environment are summarized in this paper. Moreover, we also introduce more than twenty common vulnerabilities across the ICS together with information about possible risk, attack vector (point), possible detection methods and communication layer occurrence. Therefore, the paper might be used as a base-ground for building sufficient data generator for machine learning and artificial intelligence algorithms often used in ICS/IDS systems.

Keywords

Security;Information security;Intrusion detection;Industrial control;Industrial communication

Released

24.06.2019

ISBN

978-1-7281-1542-9

Book

2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

Pages from

1

Pages to

5

Pages count

5

URL

Documents

BibTex


@inproceedings{BUT158752,
  author="Radek {Fujdiak} and Petr {Blažek} and Petr {Mlýnek} and Jiří {Mišurec}",
  title="Developing Battery of Vulnerability Tests for Industrial Control Systems",
  annote="Nowadays, the industrial control systems (ICS) face many challenges, where security is becoming one of the most crucial. This fact is caused by new connected environment, which brings among new possibilities also new vulnerabilities, threats, or possible attacks. The criminal acts in the ICS area increased over the past years exponentially, which caused the loss of billions of dollars. This also caused classical Intrusion Detection Systems and Intrusion Prevention Systems to evolve in order to protect among IT also ICS networks. However, these systems need sufficient data such as traffic logs, protocol information, attack patterns, anomaly behavior marks and many others. To provide such data, the requirements for the test environment are summarized in this paper. Moreover, we also introduce more than twenty common vulnerabilities across the ICS together with information about possible risk, attack vector (point), possible detection methods and communication layer occurrence. Therefore, the paper might be used as a base-ground for building sufficient data generator for machine learning and artificial intelligence algorithms often used in ICS/IDS systems.",
  booktitle="2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)",
  chapter="158752",
  doi="10.1109/NTMS.2019.8763810",
  howpublished="online",
  year="2019",
  month="june",
  pages="1--5",
  type="conference paper"
}