Title :
A host-based security assessment architecture for Industrial Control systems
Author :
Rakshit, Abhishek ; Ou, Xinming
Author_Institution :
Dept. of Comput. & Inf. Sci., Kansas State Univ., Manhattan, KS, USA
Abstract :
Computerized control systems perform vital functions across many critical infrastructures throughout the nation. These systems can be vulnerable to a variety of attacks leading to devastating consequences like loss of production, interruption in distribution of public utilities and most importantly endangering public safety. This calls for an approach to halt attacks in their tracks before being able to do any harm to these systems. Vulnerability assessment performed on these systems can identify and assess potential vulnerabilities in a control system network, before they are exploited by malicious intruders. An effective vulnerability assessment architecture should assimilate security knowledge from multiple sources to uncover all the vulnerabilities present on a host. Legitimate concerns arise since host-based security scanners typically need to run at administrative privileges, and takes input from external knowledge sources for the analysis making it imperative that the scanner be trustworthy. Intentionally or otherwise, ill-formed input may compromise the scanner and the whole system if the scanner is susceptible to, or carries one or more vulnerability itself. We have implemented the scanning architecture in the context of an enterprise-level security analyzer.The analyzer finds security vulnerabilities present on a host according to the third-party security knowledge specified in Open Vulnerability Assessment Language(OVAL). This paper presents an architecture where a host-based security scanner´s code base can be minimized to an extent where its correctness can be verified by adequate vetting. Moreover, the architecture also allows for leveraging third-party security knowledge efficiently and supports various higher-level security analysis.
Keywords :
control engineering computing; industrial control; security of data; computerized control systems; control system network; host-based security assessment architecture; host-based security scanners; industrial control systems; open vulnerability assessment language; third-party security knowledge; vulnerability assessment architecture; Computer architecture; Computer hacking; Control systems; Data security; Industrial control; Information security; National security; Product safety; Production systems; Telephony;
Conference_Titel :
Resilient Control Systems, 2009. ISRCS '09. 2nd International Symposium on
Conference_Location :
Idaho Falls, ID
Print_ISBN :
978-1-4244-4853-1
Electronic_ISBN :
978-1-4244-4854-8
DOI :
10.1109/ISRCS.2009.5251378