Integrating Integrity Reporting Into Industrial Control Systems: A Reality Check

Integrating Integrity Reporting Into Industrial Control Systems: A Reality Check

Tobias Rauter (Graz University of Technology, Austria), Johannes Iber (Graz University of Technology, Austria) and Christian Kreiner (Graz University of Technology, Austria)
Copyright: © 2018 |Pages: 25
DOI: 10.4018/978-1-5225-2845-6.ch014
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Due to the need of increased cooperation and connectivity, security is getting a vital property of industrial control systems. Besides system hardening, the detection of security breaches in different subsystems has been becoming a research-focus recently. This chapter summarizes the work concerning anomaly detection at different system levels. The, a system that maintains availability and integrity of distributed control systems through automated reconfiguration in case of integrity violations is proposed. We aim to detect such integrity violations through integrity reporting. This is a well-known technology, albeit not widely used in real system because of scalability problems. In this chapter, three different remote attestation methods (binary, privilege and signature-based) are integrated into a remote terminal unit to analyze and discuss the benefits and drawbacks of each method. Depending on the actual RTU architecture and already in-place development and deployment processes, the integration of remote attestation may be feasible for industrial control systems.
Chapter Preview
Top

This section starts with a discussion of the basic structure and terminologies used in a SCADA system. Subsequently, the security objectives, especially the differences compared to conventional IT systems are described. Then, we provide an overview of existing Intrusion Detection System (IDS) solutions that target the ICS domain and motivate the need of device-level configuration integrity verification and reporting (attestation) capabilities. In our work, this is achieved by trusted computing methodologies. Therefore, we give an overview of trusted computing basics and existing integrity attestation methodologies.

Complete Chapter List

Search this Book:
Reset