Detail publikace

Improving security in SCADA systems through firewall policy analysis

Originální název

Improving security in SCADA systems through firewall policy analysis

Anglický název

Improving security in SCADA systems through firewall policy analysis

Jazyk

en

Originální abstrakt

Many of modern SCADA networks are connected to both the company's enterprise network and the Internet. Because these industrial systems often control critical processes the cyber- security requirements become a priority for their design. This paper deals with network communication security in SCADA environment implemented by firewall devices. We proposed a method for verification of firewall configurations against security policy to detect and reveal potential holes in implemented rule sets. We present a straightforward verification method based on representation of a firewall configuration as a set of logical formulas suitable for automated analysis using SAT tools. We demonstrate how such configuration can be analyzed for security policy violation that can be inferred from security policy specification of an industrial automation system. 

Anglický abstrakt

Many of modern SCADA networks are connected to both the company's enterprise network and the Internet. Because these industrial systems often control critical processes the cyber- security requirements become a priority for their design. This paper deals with network communication security in SCADA environment implemented by firewall devices. We proposed a method for verification of firewall configurations against security policy to detect and reveal potential holes in implemented rule sets. We present a straightforward verification method based on representation of a firewall configuration as a set of logical formulas suitable for automated analysis using SAT tools. We demonstrate how such configuration can be analyzed for security policy violation that can be inferred from security policy specification of an industrial automation system. 

BibTex


@inproceedings{BUT103524,
  author="Ondřej {Ryšavý} and Jaroslav {Ráb} and Miroslav {Švéda}",
  title="Improving security in SCADA systems through firewall policy analysis",
  annote="Many of modern SCADA networks are connected to both the company's enterprise
network and the Internet. Because these industrial systems often control critical
processes the cyber- security requirements become a priority for their design. 

This paper deals with network communication security in SCADA environment
implemented by firewall devices. We proposed a method for verification of
firewall configurations against security policy to detect and reveal potential
holes in implemented rule sets. We present a straightforward verification method
based on representation of a firewall configuration as a set of logical formulas
suitable for automated analysis using SAT tools. We demonstrate how such
configuration can be analyzed for security policy violation that can be inferred
from security policy specification of an industrial automation system. ",
  address="IEEE Computer Society",
  booktitle="Proceedings of the Federated Conference on Computer Science and Information Systems",
  chapter="103524",
  edition="NEUVEDEN",
  howpublished="electronic, physical medium",
  institution="IEEE Computer Society",
  year="2013",
  month="september",
  pages="1435--1440",
  publisher="IEEE Computer Society",
  type="conference paper"
}