A Practical flow white list approach for SCADA systems

A Lemay, J Rochon, JM Fernandez - 4th International Symposium …, 2016 - scienceopen.com
4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016scienceopen.com
The blatant vulnerability of industrial control systems, including those controlling critical
infrastructure, is now well known. There is a need for immediately applicable security
solutions that do not interfere with normal operations. Intrusion detection through flow white
listing is an approach that can detect multiple components of modern attacks such as
pivoting and command and control channels. However, the white list approach is not
compatible with current black listbased IDS technology. This paper presents a practical …
The blatant vulnerability of industrial control systems, including those controlling critical infrastructure, is now well known. There is a need for immediately applicable security solutions that do not interfere with normal operations. Intrusion detection through flow white listing is an approach that can detect multiple components of modern attacks such as pivoting and command and control channels. However, the white list approach is not compatible with current black listbased IDS technology. This paper presents a practical approach for implementing flow white listing in SCADA system. The approach extracts a flow white list from a known good packet capture and inverts the decision logic to programmatically generate a rule set that can be consumed by a black list-based IDS. A performance evaluation shows that the approach is viable for SCADA systems, where the number of communication pairs is limited and traffic is mostly deterministic.
scienceopen.com
以上显示的是最相近的搜索结果。 查看全部搜索结果