A host-based security assessment architecture for Industrial Control systems

Abhishek Rakshit, Xinming Ou
{"title":"A host-based security assessment architecture for Industrial Control systems","authors":"Abhishek Rakshit, Xinming Ou","doi":"10.1109/ISRCS.2009.5251378","DOIUrl":null,"url":null,"abstract":"Computerized control systems perform vital functions across many critical infrastructures throughout the nation. These systems can be vulnerable to a variety of attacks leading to devastating consequences like loss of production, interruption in distribution of public utilities and most importantly endangering public safety. This calls for an approach to halt attacks in their tracks before being able to do any harm to these systems. Vulnerability assessment performed on these systems can identify and assess potential vulnerabilities in a control system network, before they are exploited by malicious intruders. An effective vulnerability assessment architecture should assimilate security knowledge from multiple sources to uncover all the vulnerabilities present on a host. Legitimate concerns arise since host-based security scanners typically need to run at administrative privileges, and takes input from external knowledge sources for the analysis making it imperative that the scanner be trustworthy. Intentionally or otherwise, ill-formed input may compromise the scanner and the whole system if the scanner is susceptible to, or carries one or more vulnerability itself. We have implemented the scanning architecture in the context of an enterprise-level security analyzer.The analyzer finds security vulnerabilities present on a host according to the third-party security knowledge specified in Open Vulnerability Assessment Language(OVAL). This paper presents an architecture where a host-based security scanner's code base can be minimized to an extent where its correctness can be verified by adequate vetting. Moreover, the architecture also allows for leveraging third-party security knowledge efficiently and supports various higher-level security analysis.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 2nd International Symposium on Resilient Control Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISRCS.2009.5251378","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Computerized control systems perform vital functions across many critical infrastructures throughout the nation. These systems can be vulnerable to a variety of attacks leading to devastating consequences like loss of production, interruption in distribution of public utilities and most importantly endangering public safety. This calls for an approach to halt attacks in their tracks before being able to do any harm to these systems. Vulnerability assessment performed on these systems can identify and assess potential vulnerabilities in a control system network, before they are exploited by malicious intruders. An effective vulnerability assessment architecture should assimilate security knowledge from multiple sources to uncover all the vulnerabilities present on a host. Legitimate concerns arise since host-based security scanners typically need to run at administrative privileges, and takes input from external knowledge sources for the analysis making it imperative that the scanner be trustworthy. Intentionally or otherwise, ill-formed input may compromise the scanner and the whole system if the scanner is susceptible to, or carries one or more vulnerability itself. We have implemented the scanning architecture in the context of an enterprise-level security analyzer.The analyzer finds security vulnerabilities present on a host according to the third-party security knowledge specified in Open Vulnerability Assessment Language(OVAL). This paper presents an architecture where a host-based security scanner's code base can be minimized to an extent where its correctness can be verified by adequate vetting. Moreover, the architecture also allows for leveraging third-party security knowledge efficiently and supports various higher-level security analysis.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于主机的工业控制系统安全评估体系结构
计算机控制系统在全国许多关键基础设施中发挥着至关重要的作用。这些系统可能容易受到各种攻击,导致生产损失、公用事业分配中断等破坏性后果,最重要的是危及公共安全。这需要一种方法,在能够对这些系统造成任何伤害之前阻止攻击。在这些系统上执行的漏洞评估可以识别和评估控制系统网络中的潜在漏洞,防止它们被恶意入侵者利用。有效的漏洞评估体系结构应该吸收来自多个来源的安全知识,以发现主机上存在的所有漏洞。由于基于主机的安全扫描器通常需要以管理权限运行,并且需要从外部知识来源获取输入以进行分析,因此产生了合理的担忧,这使得扫描器必须值得信赖。如果扫描程序本身容易受到或携带一个或多个漏洞,那么无论有意还是无意,格式错误的输入都可能危及扫描程序和整个系统。我们已经在企业级安全分析器的上下文中实现了扫描架构。分析器根据开放漏洞评估语言(OVAL)中指定的第三方安全知识,发现主机上存在的安全漏洞。本文提出了一种架构,其中基于主机的安全扫描程序的代码库可以最小化到可以通过适当的审查来验证其正确性的程度。此外,该体系结构还允许有效地利用第三方安全知识,并支持各种高级安全分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Bayesian inference for fault-tolerant control A host-based security assessment architecture for Industrial Control systems Extreme point result for robust stability of interval polynomials to the special left sector The VIKING project: An initiative on resilient control of power networks Intelligent neural network implementation for SOCI development of Li/CFx batteries
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1