SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. II (Mar – Apr. 2015), PP 37-42
www.iosrjournals.org
DOI: 10.9790/0661-17223742 www.iosrjournals.org 37 | Page
Privacy Protection in Distributed Industrial System
1
P.Sheela Rani, 2
B.Malavika, 3
D.Menaka
1.Assistant Professor, Dept of I.T, Panimalar Institute of Technology,Anna University , Chennai,India.
2.IIIrd Year .Student, Dept of I.T, Panimalar Institute of Technology,Anna University , Chennai,India.
3.IIIrd Year .Student, Dept of I.T, Panimalar Institute of Technology,Anna University ,Chennai,India.
Abstract: Although awareness is constantly rising, that industrial computer networks (in a very broad sense)
can be exposed to serious cyber threats, many people still think that the same countermeasures, developed to
protect general-purpose computer networks, can be effectively adopted also in those situations where a physical
system is managed/controlled through some distributed Information and Communication Technology (ICT)
infrastructure. Unfortunately, this is not the case, as several examples of successful attacks carried out in the
last decade, and more frequently in the very recent past, have dramatically shown. Experts in this area know
very well that often the peculiarities of industrial networks prevent the adoption of classical approaches to their
security and, in particular, of those popular solutions that are mainly based on a detect and patch philosophy.
This paper is a contribution, from the security point of view, to the assessment of the current situation of a wide
class of industrial distributed computing systems. In particular, the analysis presented in this paper takes into
account the process of ensuring a satisfactory degree of security for a distributed industrial system, with respect
to some key elements such as the system characteristics, the current state of the art of standardization and the
adoption of suitable controls (countermeasures) that can help in lowering the security risks below a predefined,
acceptable threshold.
Keywords: Industrial networks, information security, network security, risk assessment, security analysis and
monitoring, security countermeasures.
I. Introduction
Interconnection through digital communication networks is of primary importance, today, in many
distributed heterogeneous environments where people and things, besides services and data, have to be
protected against injuries and damages. This is the case, for instance, of critical infra-structures designed for
energy, gas, and water distribution, transportation systems, and air traffic control, but, even with different
characteristics, the same is also true for other application domains, such as Industrial Process Measurement and
Control (IPCM), Supervision, Control and Data Acquisition (SCADA), Distributed Control (DC), Metering,
Monitoring and Diagnostic (MMD), Networked Electronic Control and Sensing (NECS), and Distributed
Automation (DA) systems. Although peculiarities can be identified for each scenario , a set of common security
characteristics exists, which allows us to consider these systems as belonging to a single broad class. With a
slight abuse of terminology, we will call this class either Privacy of Networks or Industrial Automation Control
Systems (IACSs) in the following, provided that no ambiguity could arise.
Fig. 1. Typical connections of IACS to corporate networks and the internet.
In the case of the picture, the IACS communication infra-structure (the three rightmost blocks) can
access the Internet through a DBCS network: dashed lines inside each block may represent different kinds of
media (i.e., Ethernet cables, phone lines, fiber optics, radio and WiFi links) and proper equipment (routers,
gateways, modems, access points and so on). The key point, however, is that the IACS infrastructure is directly
Privacy Protection in Distributed Industrial System
DOI: 10.9790/0661-17223742 www.iosrjournals.org 38 | Page
interfaced to a physical system , through its sensors and actuators, while this does not occur in the case of
DBCS. Fig. 1 also shows that two main different kinds of (sub)networks can be found in typical IACS, that is,
control networks responsible, for instance, for enabling the correct and effective behavior of regulation loops
according to the system (even hard) real-time requirements, and process networks designed to support
supervisory and management functions through SCADAs and other specialized software modules. It is worth
remembering that, although process net-works are less concerned with real time than their control counterparts ,
nevertheless they often have to grant satisfactory performance in term of the maximum acceptable response
time.
The main goal of this paper is to make an overall assessment of the current situation most industrial
distributed computing systems are experiencing, with respect to security. To this purpose, we consider the
typical steps that have to be followed to ensure a satisfactory security level for IACS and discuss the main
elements involved in this process, such as the system characteristics, the current state of the art of
standardization and the adoption of suitable controls (countermeasures) that can be employed to lower the
security risks below a predefined, acceptable threshold.
Roughly speaking, current researches dealing explicitly with the security of IACS can be classified in
two main categories. The first one takes into account the system as a whole, and deals with its characteristics
from a global point of view. These studies include, for instance, some innovative approaches to the design and
development of a secure system, the design of security analysis techniques and tools and the assessment,
evaluation and management of risks at the system level. The second broad category includes those scientific
activities carried out to tackle specific security problems at the component level. For our purposes, the term
component refers to any (collection of) h/w and/or s/w mechanism(s) that can be used to improve the security of
(a part of) the system. Typical examples of components are security protocols, authentication schemes and
algorithms, firewalls, intrusion detection systems and so on. Obviously, system-level strategies often rely on or
make use of mechanisms and solutions designed and implemented at the component level.
Table II: Security Requirements In Iacs And Dbcs
Table III: Different Criticalities Between Iacs And Dbcs
II. Related Work
From a historical perspective, security requirements of IACS were traditionally specified by organizations that
were active in a number of critical infrastructure domains including, for ex-ample:
• water and gas distribution;
• electricity transmission and distribution ;
• gas and oil production ;
• food production and distribution;
• transportation systems.
In all of these areas, the importance of security has always been recognized as progressively increasing
since ever. The hetero-geneity in standardization approaches, however, enabled the de-velopment of a number
of ad hoc security guidelines and recom-mendations, tailored to the specific needs of the application contexts
which they were conceived for however, is that ISM concerns the whole organization of a com-pany including,
with the following examples given here :
• training and commitment of employees and managers;
• relationships with partners, suppliers and customers;
• business continuity;
• legal and contractual requirements;
• compliance with security policies and standards;
• technical compliance;
• asset management;
Privacy Protection in Distributed Industrial System
DOI: 10.9790/0661-17223742 www.iosrjournals.org 39 | Page
• access control;
• communications and operations management;
• physical and environmental security.
Note that all aspects listed above are strictly related: for in-stance, the commitment of management
ensures necessary re-sources and investments (training, equipment, and audits), while the training of employees
enables the understanding of security mechanisms and techniques, as long as the correct implementa-tion of
policies and procedures
Fig. 2. Main phases of the ISM process.
Validation is aimed at proving that the overall risk has been lowered below an acceptable threshold and
usually involves both offline (i.e., new risk assessment sessions) and run-time (i.e., monitoring and
measurements) activities. The whole sequence of steps is then repeated whenever: 1) the results checked in the
validation phase do not match expec-tations (inadequate risk reduction); 2) changes are introduced in any
part/component of the overall system, including equip-ment, policies, risk levels, business, regulatory or legal
requirements, newly discovered threats or vulnerabilities and so on; or 3) the run-time monitoring activities
detect a security incident with consequences exceeding the acceptable severity threshold (estimated
consequences are part of the results produced during the risk assessment)
III. Proposed system
IACS Risk Assessment
Risk consequences are often measured in terms of monetary losses, since this metric is widely
understood and popular at the management level, although it could appear somewhat improper when referred to
injuries or environmental damages. Risk assessment techniques, which have been explicitly developed for IACS
so far, can be classified in three main categories , depending on the way the model of the system is developed.
A. Hierarchical Holographic Models
HHM is a methodology conceived to decompose a com-plex system with inter-dependencies into
several independent views (subsystems), each one focusing on different aspects and needs (e.g., the description
of the short/long term behavior of the system with not commensurable time scale, its represen-tation with
diverse levels of abstraction that are useful to different people such as technicians and managers, and so on).
After views have been specified, HHM allows to combine all ―specific‖ models in a coherent way and to capture
all possible sources of risk.
In order to rank, filter and manage the identified risks, en-hanced the work in by introducing a Risk
Filtering, Ranking and Management (RFRM) technique, that is mainly intended to both re fine/prioritize the
most meaningful risks, and prune those which can be considered as negligible, through a step-based approach.
B. Inoperability Input–Output Models
IMM overcomes some limitations of the HHM approach for systems with complex inter- dependencies
among their com-ponents. In IMM, the system is hierarchically decomposed into a number of subsystems which
interact exchanging resources. The input of the risk analyzer is the initial perturbation triggered by an attack,
while produced results are the possible cascading inoperabilitie and economic losses.
The analysis of simple costs is a general limit of most techniques available today. Some studies have
started to circumvent this problem with the introduction of operational data to estimate the consequences of
inoperability in highly interdependent infrastructures. As estimations are unavoidably provided by sector -
specific experts, a methodology has also been pro-posed in , which is based on fuzzy numbers, to deal with the
problem of subjectivity.
Privacy Protection in Distributed Industrial System
DOI: 10.9790/0661-17223742 www.iosrjournals.org 40 | Page
C. Probabilistic Risk Assessment
The broad notion of PRA includes a number of methodologies and tools based on a shared
characterization of the concept of risk, that is, the severity (magnitude) of the consequences of an event and the
likelihood that the event itself can occur . Usually, the underlying models of the system be-long to the wide
category of graphs (sometimes reduced to trees when dealing with simpler systems and/or inter-dependencies or
when a coarser grained analysis can be considered satisfac-tory). In most cases, graph vertices represent the
system components while edges describe dependencies. On the other hand, the ways graphs are analyzed fall in
two subcategories of PRA, that is either deductive (backward) or inductive (forward) analysis techniques.
1) Deductive Analysis: Deductive analyzers define a so-called top event representing the unwanted
consequences of attacks or failures. Starting from the affected system compo-nents, the model is then
explored until the origins of the attack or failure are found. Typical examples of deductive analysis are the
fault tree analysis (FTA) , dealing with faults, and the attack tree analysis , where the top event is the
attacker goal rather than a fault.
2) Inductive Analysis: Inductive analyzers start from a triggering event and compute all its possible
consequences. The work presented in is a case of inductive analysis where binary decision diagrams
(BDDs) are adopted to improve the performance of the analysis.
IV. IACS System-Level Security
From a systemic point of view, a very big challenge, de-manding for deep technical innovations, is the
development of a new kind of IACS which are security-aware. Until recently, in fact, security issues have not
been considered too seriously in the early planning phases of a new system. The main reason is that security is
often perceived as a sort of (even important) add-on, that may be included in the system at a later time or,
howsoever, whenever it is needed . This way of thinking has influenced the research community for quite a long
time, and is still affecting many scientific and technical works also today. Most papers appeared in the literature,
indeed, present techniques and solutions to either introduce/improve security mechanisms in some existing
system or superimpose security after a system has been conceived and developed to satisfy its functional,
application and performance requirements. From a certain point of view, this approach might also be considered
reasonable, at least up to a point, due to the following reasons:
• Redesigning (parts of) existing IACS is simply unfeasible or exaggeratedly expensive in most case.
A second big challenge where a radical change of direction is needed is in how IACS security problems
are tackled and solved today. In fact, most techniques and solutions developed so far have been based on a
―static‖ view of security, but systems, components, threats, and attacks change continuously and new challenges
have always to be faced . This demands new methodologies and information security support to evaluate and
assess the security level of IACS, to check their vulnerability to new and different types of attacks, and to
suggest the adoption of suitable countermeasures, which can be developed only after a significant turn of
mentality in the approach.
Fortunately enough, although IACS can be very complex sys-tems, they usually have a reduced
network dynamics when com-pared with DBCS, since the set of users and protocols involved is smaller and
almost fixed, while system topologies are simpler . In perspective, this factor can be leveraged to simplify the
development of models and analysis techniques and the intro-duction of countermeasures.
V. IACS Security Controls
While security strategies and policies are mainly dealt with at the system level, mechanisms to enforce
and support them are usually of interest of the component level. As already men-tioned before, in this paper we
use the term component with a meaning broad enough to include a number of security-related controls and
techniques such as, for instance, cryptography and cryptographic protocols, which are adopted for ensuring
privacy and authentication in the communication. This section, in particular, focuses on those controls
concerning (intrusion) prevention, detection, and reaction to security attacks. Although these three aspects are
conceptually distinct, they are rarely considered separately, as in many practical situations countermeasures are
conceived to tackle two of them (typically detection and re-action) or even all of them at the same time
A. Prevention Controls
Privacy Protection in Distributed Industrial System
DOI: 10.9790/0661-17223742 www.iosrjournals.org 41 | Page
In principle, contributions to IACS intrusion prevention should follow a well-established sequence of four steps,
given here.
1) Definition of the security goals (i.e., explicit security policies or requirements).
2) Implicit/explicit development of one or more models of the attacker/threat that could violate the above
policies.
3) Some kind of security analysis and/or validation to prove that the proposed security controls are able to
satisfy the requirements, even against the modeled attacker/threat.
Some performance evaluation to check that the proposed controls do not affect the system behavior negatively
(e.g., with respect to the real-time and/or power constraints .
The security requirements in the highly demanded collabo-rative control of distributed device networks
under open and dynamic environments were addressed in , by inserting a Security Agent (SA) layer between
each entity and the inse-cure network environment. Through a PKI, SA should be able to guarantee all of the
desired security properties, though no formal proof is provided that performance and functional requirements are
really satisfied.
B. Detection Controls
Preventing any threat to assets is clearly not possible and this is true, in particular, for IACS, where the
dynamics of changes in h/w and s/w during the system lifetime is by far slower than the evolution of attack
methods and technologies (see Table I). Keeping the system under continuous monitoring is then essential, both
to rapidly notify the people in charge when dangerous situations occur, and to trigger (automatic) reactions for
fault mitigation and healing. In fact, this is the primary goal of intrusion detection controls.
Intrusion detection in computer networks is a well-known and established issue, which dates back to
the eighties at least. Intrusion Detection Systems are designed to quickly discover the presence of attacks in
progress or the occurrence of failures, by means of some evidence gathered from the live system, while it is
performing its operations. Not only ideal IDSs should avoid that some attacks go undetected (false negatives),
but they are also requested not to cause false positives, that is, alarms raised when no attack is in progress. In the
following, we will call ac-curacy, this characteristic which is one of the main areas where continuous research
and development are needed.
Table VII: Main Methodologies For Detection
Signature- based techniques require the explicit definition of ―signatures‖ of known attacks in terms of
characteristic mes-sage patterns. Unfortunately, two main drawbacks have to be carefully considered in this
case: first the exact characterization of attacks is a difficult task which can signi ficantly affect the effectiveness
of detection. This means that the derivation of suitable signatures , has to start almost from scratch.
1.Stateless IDSs: DoS attacks to a generic control system (sampling rate equal to 0.02 s, controller and plant
intercon-nected through the Internet) were simulated in . In particular, the characterization in terms of packet
delays, jitters, and losses and their correlation to the rise and settling times of the controlled system were used to
measure how much the system performance could be affected by DoS. Authors then proposed to deploy IDSs
on the network routers, and showed how the rise and settling times of the controlled system improved under the
same attacks.
2) Stateful IDSs: When information concerning the whole system is exploited, both attacks and faults can be
detected and even predicted. This also enables IDSs to reason about the attacker’s goals instead of the attack
mechanisms, a characteristic which can be particularly useful when dealing with threats conceived to slowly
shift the system behavior to an unsafe state.
Finally, a rough estimation of main IDS issues covered in re-search papers could be derived in a way
similar to the discussion already carried out in the prevention subsection. In the case of IDSs, however, accuracy
and performance impact are the two topics of utmost importance.
From this point of view less than 67% of the punlished papers has dealt with accuracy, whereas
performance has been explicitly tackled and discussed only by 27% of them. These two indicators are
sufficiently low to conclude that much more effort and future studies are strongly needed in this area.
Privacy Protection in Distributed Industrial System
DOI: 10.9790/0661-17223742 www.iosrjournals.org 42 | Page
VI. Conclusion
This paper has dealt with the current situation of security in IACS. We have shown that, nowadays,
security in IACS as a never-ending cyclical process that moves through a well-defined set of main phases, .
Each phase has then been addressed in this paper, with respect to the current state of the art, to give an idea of
the problems and scientific/technical challenges that have to be tackled in order to reduce the security risks
under a predefined, acceptable threshold.
In this framework, the study and development of automatic/ semiautomatic analysis IT techniques and
tools that are able to deal with security at a global (system) level, can be of significant help in making each
phase of the management process easier and more efficient. Indeed, we think that, because of the complexity
and size of many IACS, quick and effective security management decisions and (re)actions will become harder
to take in the near future, so that the scientific community is expected to propose and develop new advanced
techniques to support IACS security experts and managers in carrying out their tasks.
References
[1]. Security for Industrial Automation and Control Systems Part 1: Termi-nology, Concepts, Models, ANSI/ISA Std. 99.00.01-2007.
[2]. K. Stouffer, J. Falco, and K. Scarfone, ―Guide to Industrial Control Systems (ICS) Security,‖ NIST SP 800-82, 2008.
[3]. D. Dzung, M. Naedele, T. P. von Hoff, and M. Crevatin, ―Security for industrial control systems,‖ Proc. IEEE, vol. 93, no. 6, pp.
1152–1177, Jun. 2005.
[4]. G. N. Ericsson, ―Cyber security and power system communica-tion—Essential parts of a smart grid infrastructure,‖ IEEE Trans.
Power Del., vol. 25, no. 3, pp. 1501–1507, Aug. 2011.
[5]. Security for Industrial Automation and Control Systems Part 1: Termi-nology, Concepts, Models, ANSI/ISA Std. 99.00.01-2007.
[6]. K. Stouffer, J. Falco, and K. Scarfone, ―Guide to Industrial Control Systems (ICS) Security,‖ NIST SP 800-82, 2008.
[7]. D. Dzung, M. Naedele, T. P. von Hoff, and M. Crevatin, ―Security for industrial control systems,‖ Proc. IEEE, vol. 93, no. 6, pp.
1152–1177, Jun. 2005.
[8]. G. N. Ericsson, ―Cyber security and power system communica-tion—Essential parts of a smart grid infrastructure,‖ IEEE Trans.
Power Del., vol. 25, no. 3, pp. 1501–1507, Aug. 2010.
Author’s Biography
P.Sheela Rani, is an Assistant Professor, in Department of Information Technology at
Panimalar Institute of Technology , Chennai, India . She received M.E degree in Computer
Science & Engineering dept in 2011 at Anna University, Trichy, India. She has 8 years
experience in Teaching.. She is the Life member of ISTE. Area of Interest are Network Security,
Computer Networks, Cryptography & Security. [rpsheelarani2014@gmail.com].
Malavika is a third year student in the Department of Information Technology at Panimalar Institute of
Technology , Chennai, India. Area of Interest is Computer Networks. (malavika.guru@gmail.com).
D.Menaka is a third year student in the Department of Information Technology at Panimalar Institute of
Technology , Chennai, India. Area of Interest are Computer Networks and Network Security.
(menu.rosh95@gmail.com)
Author’s formal
photo

More Related Content

PDF
Information security management guidance for discrete automation
PDF
(2006) Graduate Course Development Focusing on Security Issues in Manufacturing
PDF
Secure architecture-industrial-control-systems-36327
PDF
Five principles for improving your cyber security
PDF
1973-16 Tackling the challenges of cyber security_19_03_15
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
PDF
Multi agents system service based platform in telecommunication security inci...
Information security management guidance for discrete automation
(2006) Graduate Course Development Focusing on Security Issues in Manufacturing
Secure architecture-industrial-control-systems-36327
Five principles for improving your cyber security
1973-16 Tackling the challenges of cyber security_19_03_15
International Journal of Engineering Research and Development (IJERD)
Dhana Raj Markandu: Control System Cybersecurity - Challenges in a New Energy...
Multi agents system service based platform in telecommunication security inci...

What's hot (19)

PDF
(2005) Securing Manufacturing Environment using Biometrics
PDF
Multi agents based architecture for is security incident reaction
PPTX
Security management concepts and principles
PDF
G41044251
PDF
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
DOC
report on Mobile security
PDF
An analysis of the supply chain risk
PDF
(2003) Securing the Biometric Model
PPT
Introduction to Information System Security
PDF
Bf25342345
PDF
Nist.sp.800 37r2
PPTX
CMMC Certification
PDF
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
PDF
Chapter 10 security standart
PPT
is_1_Introduction to Information Security
DOCX
Developing ics cyber security improvement plan(5)
PPT
Security Management Practices
PPT
IT Audit methodologies
PDF
ARRL: A Criterion for Composable Safety and Systems Engineering
(2005) Securing Manufacturing Environment using Biometrics
Multi agents based architecture for is security incident reaction
Security management concepts and principles
G41044251
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
report on Mobile security
An analysis of the supply chain risk
(2003) Securing the Biometric Model
Introduction to Information System Security
Bf25342345
Nist.sp.800 37r2
CMMC Certification
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
Chapter 10 security standart
is_1_Introduction to Information Security
Developing ics cyber security improvement plan(5)
Security Management Practices
IT Audit methodologies
ARRL: A Criterion for Composable Safety and Systems Engineering
Ad

Viewers also liked (14)

PDF
Cheap cocktail dresses affordable cocktail gowns gudeer.com
PPT
GenChem000-WhatIsChemistry
PDF
Cheap prom dresses affordable prom gowns gudeer.com
PDF
Cheap flower girl dresses nz,latest flower girl gowns online cmdress.co.nz
DOCX
trung tâm mua đồng hồ casio chất lượng cao
PDF
1 NPAs benefitting PSBs
PPTX
Impacto de la tegnologia en la sociedad
PDF
M010219295
PDF
Satin bridesmaid dresses gudeer.com
PPTX
Nervous system problems
PDF
Performance Improvement of IEEE 802.22 WRAN Physical Layer
DOCX
Penawaraniklan 140828233847-phpapp01
PDF
E010112328
Cheap cocktail dresses affordable cocktail gowns gudeer.com
GenChem000-WhatIsChemistry
Cheap prom dresses affordable prom gowns gudeer.com
Cheap flower girl dresses nz,latest flower girl gowns online cmdress.co.nz
trung tâm mua đồng hồ casio chất lượng cao
1 NPAs benefitting PSBs
Impacto de la tegnologia en la sociedad
M010219295
Satin bridesmaid dresses gudeer.com
Nervous system problems
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Penawaraniklan 140828233847-phpapp01
E010112328
Ad

Similar to F017223742 (20)

PDF
Nist 800 82
PDF
Cyber Security: Differences between Industrial Control Systems and ICT Approach
PDF
Industrial Control Systems Security and Resiliency Practice and Theory Craig ...
PDF
Securing Industrial Control System
PDF
Industrial Control Systems Security and Resiliency Practice and Theory Craig ...
PPT
Industrial control systems cybersecurity.ppt
PPTX
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
PDF
American Bar Assoc. ISC 2009
PPT
Power Grid Communications & Control Systems
PPTX
Critical Infrastructure Security by Subodh Belgi
PPT
Control system including PLC cybersecurity
PPTX
ICS_Security_Use_Case_Presentation (1).pptx
PPTX
OT_Security.pptx
PDF
Industrial networks safety & security - e+h june 2018 ben murphy
PDF
David Blanco ISHM 8280-2016
PDF
Paper4
PDF
Securing Critical Infrastructures And Critical Control Systems Approaches For...
PDF
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
PDF
WP82 Physical Security in Mission Critical Facilities
PPTX
Computer security aspects in
Nist 800 82
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Industrial Control Systems Security and Resiliency Practice and Theory Craig ...
Securing Industrial Control System
Industrial Control Systems Security and Resiliency Practice and Theory Craig ...
Industrial control systems cybersecurity.ppt
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
American Bar Assoc. ISC 2009
Power Grid Communications & Control Systems
Critical Infrastructure Security by Subodh Belgi
Control system including PLC cybersecurity
ICS_Security_Use_Case_Presentation (1).pptx
OT_Security.pptx
Industrial networks safety & security - e+h june 2018 ben murphy
David Blanco ISHM 8280-2016
Paper4
Securing Critical Infrastructures And Critical Control Systems Approaches For...
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
WP82 Physical Security in Mission Critical Facilities
Computer security aspects in

More from IOSR Journals (20)

PDF
A011140104
PDF
M0111397100
PDF
L011138596
PDF
K011138084
PDF
J011137479
PDF
I011136673
PDF
G011134454
PDF
H011135565
PDF
F011134043
PDF
E011133639
PDF
D011132635
PDF
C011131925
PDF
B011130918
PDF
A011130108
PDF
I011125160
PDF
H011124050
PDF
G011123539
PDF
F011123134
PDF
E011122530
PDF
D011121524
A011140104
M0111397100
L011138596
K011138084
J011137479
I011136673
G011134454
H011135565
F011134043
E011133639
D011132635
C011131925
B011130918
A011130108
I011125160
H011124050
G011123539
F011123134
E011122530
D011121524

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Encapsulation theory and applications.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Big Data Technologies - Introduction.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Encapsulation theory and applications.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Big Data Technologies - Introduction.pptx

F017223742

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. II (Mar – Apr. 2015), PP 37-42 www.iosrjournals.org DOI: 10.9790/0661-17223742 www.iosrjournals.org 37 | Page Privacy Protection in Distributed Industrial System 1 P.Sheela Rani, 2 B.Malavika, 3 D.Menaka 1.Assistant Professor, Dept of I.T, Panimalar Institute of Technology,Anna University , Chennai,India. 2.IIIrd Year .Student, Dept of I.T, Panimalar Institute of Technology,Anna University , Chennai,India. 3.IIIrd Year .Student, Dept of I.T, Panimalar Institute of Technology,Anna University ,Chennai,India. Abstract: Although awareness is constantly rising, that industrial computer networks (in a very broad sense) can be exposed to serious cyber threats, many people still think that the same countermeasures, developed to protect general-purpose computer networks, can be effectively adopted also in those situations where a physical system is managed/controlled through some distributed Information and Communication Technology (ICT) infrastructure. Unfortunately, this is not the case, as several examples of successful attacks carried out in the last decade, and more frequently in the very recent past, have dramatically shown. Experts in this area know very well that often the peculiarities of industrial networks prevent the adoption of classical approaches to their security and, in particular, of those popular solutions that are mainly based on a detect and patch philosophy. This paper is a contribution, from the security point of view, to the assessment of the current situation of a wide class of industrial distributed computing systems. In particular, the analysis presented in this paper takes into account the process of ensuring a satisfactory degree of security for a distributed industrial system, with respect to some key elements such as the system characteristics, the current state of the art of standardization and the adoption of suitable controls (countermeasures) that can help in lowering the security risks below a predefined, acceptable threshold. Keywords: Industrial networks, information security, network security, risk assessment, security analysis and monitoring, security countermeasures. I. Introduction Interconnection through digital communication networks is of primary importance, today, in many distributed heterogeneous environments where people and things, besides services and data, have to be protected against injuries and damages. This is the case, for instance, of critical infra-structures designed for energy, gas, and water distribution, transportation systems, and air traffic control, but, even with different characteristics, the same is also true for other application domains, such as Industrial Process Measurement and Control (IPCM), Supervision, Control and Data Acquisition (SCADA), Distributed Control (DC), Metering, Monitoring and Diagnostic (MMD), Networked Electronic Control and Sensing (NECS), and Distributed Automation (DA) systems. Although peculiarities can be identified for each scenario , a set of common security characteristics exists, which allows us to consider these systems as belonging to a single broad class. With a slight abuse of terminology, we will call this class either Privacy of Networks or Industrial Automation Control Systems (IACSs) in the following, provided that no ambiguity could arise. Fig. 1. Typical connections of IACS to corporate networks and the internet. In the case of the picture, the IACS communication infra-structure (the three rightmost blocks) can access the Internet through a DBCS network: dashed lines inside each block may represent different kinds of media (i.e., Ethernet cables, phone lines, fiber optics, radio and WiFi links) and proper equipment (routers, gateways, modems, access points and so on). The key point, however, is that the IACS infrastructure is directly
  • 2. Privacy Protection in Distributed Industrial System DOI: 10.9790/0661-17223742 www.iosrjournals.org 38 | Page interfaced to a physical system , through its sensors and actuators, while this does not occur in the case of DBCS. Fig. 1 also shows that two main different kinds of (sub)networks can be found in typical IACS, that is, control networks responsible, for instance, for enabling the correct and effective behavior of regulation loops according to the system (even hard) real-time requirements, and process networks designed to support supervisory and management functions through SCADAs and other specialized software modules. It is worth remembering that, although process net-works are less concerned with real time than their control counterparts , nevertheless they often have to grant satisfactory performance in term of the maximum acceptable response time. The main goal of this paper is to make an overall assessment of the current situation most industrial distributed computing systems are experiencing, with respect to security. To this purpose, we consider the typical steps that have to be followed to ensure a satisfactory security level for IACS and discuss the main elements involved in this process, such as the system characteristics, the current state of the art of standardization and the adoption of suitable controls (countermeasures) that can be employed to lower the security risks below a predefined, acceptable threshold. Roughly speaking, current researches dealing explicitly with the security of IACS can be classified in two main categories. The first one takes into account the system as a whole, and deals with its characteristics from a global point of view. These studies include, for instance, some innovative approaches to the design and development of a secure system, the design of security analysis techniques and tools and the assessment, evaluation and management of risks at the system level. The second broad category includes those scientific activities carried out to tackle specific security problems at the component level. For our purposes, the term component refers to any (collection of) h/w and/or s/w mechanism(s) that can be used to improve the security of (a part of) the system. Typical examples of components are security protocols, authentication schemes and algorithms, firewalls, intrusion detection systems and so on. Obviously, system-level strategies often rely on or make use of mechanisms and solutions designed and implemented at the component level. Table II: Security Requirements In Iacs And Dbcs Table III: Different Criticalities Between Iacs And Dbcs II. Related Work From a historical perspective, security requirements of IACS were traditionally specified by organizations that were active in a number of critical infrastructure domains including, for ex-ample: • water and gas distribution; • electricity transmission and distribution ; • gas and oil production ; • food production and distribution; • transportation systems. In all of these areas, the importance of security has always been recognized as progressively increasing since ever. The hetero-geneity in standardization approaches, however, enabled the de-velopment of a number of ad hoc security guidelines and recom-mendations, tailored to the specific needs of the application contexts which they were conceived for however, is that ISM concerns the whole organization of a com-pany including, with the following examples given here : • training and commitment of employees and managers; • relationships with partners, suppliers and customers; • business continuity; • legal and contractual requirements; • compliance with security policies and standards; • technical compliance; • asset management;
  • 3. Privacy Protection in Distributed Industrial System DOI: 10.9790/0661-17223742 www.iosrjournals.org 39 | Page • access control; • communications and operations management; • physical and environmental security. Note that all aspects listed above are strictly related: for in-stance, the commitment of management ensures necessary re-sources and investments (training, equipment, and audits), while the training of employees enables the understanding of security mechanisms and techniques, as long as the correct implementa-tion of policies and procedures Fig. 2. Main phases of the ISM process. Validation is aimed at proving that the overall risk has been lowered below an acceptable threshold and usually involves both offline (i.e., new risk assessment sessions) and run-time (i.e., monitoring and measurements) activities. The whole sequence of steps is then repeated whenever: 1) the results checked in the validation phase do not match expec-tations (inadequate risk reduction); 2) changes are introduced in any part/component of the overall system, including equip-ment, policies, risk levels, business, regulatory or legal requirements, newly discovered threats or vulnerabilities and so on; or 3) the run-time monitoring activities detect a security incident with consequences exceeding the acceptable severity threshold (estimated consequences are part of the results produced during the risk assessment) III. Proposed system IACS Risk Assessment Risk consequences are often measured in terms of monetary losses, since this metric is widely understood and popular at the management level, although it could appear somewhat improper when referred to injuries or environmental damages. Risk assessment techniques, which have been explicitly developed for IACS so far, can be classified in three main categories , depending on the way the model of the system is developed. A. Hierarchical Holographic Models HHM is a methodology conceived to decompose a com-plex system with inter-dependencies into several independent views (subsystems), each one focusing on different aspects and needs (e.g., the description of the short/long term behavior of the system with not commensurable time scale, its represen-tation with diverse levels of abstraction that are useful to different people such as technicians and managers, and so on). After views have been specified, HHM allows to combine all ―specific‖ models in a coherent way and to capture all possible sources of risk. In order to rank, filter and manage the identified risks, en-hanced the work in by introducing a Risk Filtering, Ranking and Management (RFRM) technique, that is mainly intended to both re fine/prioritize the most meaningful risks, and prune those which can be considered as negligible, through a step-based approach. B. Inoperability Input–Output Models IMM overcomes some limitations of the HHM approach for systems with complex inter- dependencies among their com-ponents. In IMM, the system is hierarchically decomposed into a number of subsystems which interact exchanging resources. The input of the risk analyzer is the initial perturbation triggered by an attack, while produced results are the possible cascading inoperabilitie and economic losses. The analysis of simple costs is a general limit of most techniques available today. Some studies have started to circumvent this problem with the introduction of operational data to estimate the consequences of inoperability in highly interdependent infrastructures. As estimations are unavoidably provided by sector - specific experts, a methodology has also been pro-posed in , which is based on fuzzy numbers, to deal with the problem of subjectivity.
  • 4. Privacy Protection in Distributed Industrial System DOI: 10.9790/0661-17223742 www.iosrjournals.org 40 | Page C. Probabilistic Risk Assessment The broad notion of PRA includes a number of methodologies and tools based on a shared characterization of the concept of risk, that is, the severity (magnitude) of the consequences of an event and the likelihood that the event itself can occur . Usually, the underlying models of the system be-long to the wide category of graphs (sometimes reduced to trees when dealing with simpler systems and/or inter-dependencies or when a coarser grained analysis can be considered satisfac-tory). In most cases, graph vertices represent the system components while edges describe dependencies. On the other hand, the ways graphs are analyzed fall in two subcategories of PRA, that is either deductive (backward) or inductive (forward) analysis techniques. 1) Deductive Analysis: Deductive analyzers define a so-called top event representing the unwanted consequences of attacks or failures. Starting from the affected system compo-nents, the model is then explored until the origins of the attack or failure are found. Typical examples of deductive analysis are the fault tree analysis (FTA) , dealing with faults, and the attack tree analysis , where the top event is the attacker goal rather than a fault. 2) Inductive Analysis: Inductive analyzers start from a triggering event and compute all its possible consequences. The work presented in is a case of inductive analysis where binary decision diagrams (BDDs) are adopted to improve the performance of the analysis. IV. IACS System-Level Security From a systemic point of view, a very big challenge, de-manding for deep technical innovations, is the development of a new kind of IACS which are security-aware. Until recently, in fact, security issues have not been considered too seriously in the early planning phases of a new system. The main reason is that security is often perceived as a sort of (even important) add-on, that may be included in the system at a later time or, howsoever, whenever it is needed . This way of thinking has influenced the research community for quite a long time, and is still affecting many scientific and technical works also today. Most papers appeared in the literature, indeed, present techniques and solutions to either introduce/improve security mechanisms in some existing system or superimpose security after a system has been conceived and developed to satisfy its functional, application and performance requirements. From a certain point of view, this approach might also be considered reasonable, at least up to a point, due to the following reasons: • Redesigning (parts of) existing IACS is simply unfeasible or exaggeratedly expensive in most case. A second big challenge where a radical change of direction is needed is in how IACS security problems are tackled and solved today. In fact, most techniques and solutions developed so far have been based on a ―static‖ view of security, but systems, components, threats, and attacks change continuously and new challenges have always to be faced . This demands new methodologies and information security support to evaluate and assess the security level of IACS, to check their vulnerability to new and different types of attacks, and to suggest the adoption of suitable countermeasures, which can be developed only after a significant turn of mentality in the approach. Fortunately enough, although IACS can be very complex sys-tems, they usually have a reduced network dynamics when com-pared with DBCS, since the set of users and protocols involved is smaller and almost fixed, while system topologies are simpler . In perspective, this factor can be leveraged to simplify the development of models and analysis techniques and the intro-duction of countermeasures. V. IACS Security Controls While security strategies and policies are mainly dealt with at the system level, mechanisms to enforce and support them are usually of interest of the component level. As already men-tioned before, in this paper we use the term component with a meaning broad enough to include a number of security-related controls and techniques such as, for instance, cryptography and cryptographic protocols, which are adopted for ensuring privacy and authentication in the communication. This section, in particular, focuses on those controls concerning (intrusion) prevention, detection, and reaction to security attacks. Although these three aspects are conceptually distinct, they are rarely considered separately, as in many practical situations countermeasures are conceived to tackle two of them (typically detection and re-action) or even all of them at the same time A. Prevention Controls
  • 5. Privacy Protection in Distributed Industrial System DOI: 10.9790/0661-17223742 www.iosrjournals.org 41 | Page In principle, contributions to IACS intrusion prevention should follow a well-established sequence of four steps, given here. 1) Definition of the security goals (i.e., explicit security policies or requirements). 2) Implicit/explicit development of one or more models of the attacker/threat that could violate the above policies. 3) Some kind of security analysis and/or validation to prove that the proposed security controls are able to satisfy the requirements, even against the modeled attacker/threat. Some performance evaluation to check that the proposed controls do not affect the system behavior negatively (e.g., with respect to the real-time and/or power constraints . The security requirements in the highly demanded collabo-rative control of distributed device networks under open and dynamic environments were addressed in , by inserting a Security Agent (SA) layer between each entity and the inse-cure network environment. Through a PKI, SA should be able to guarantee all of the desired security properties, though no formal proof is provided that performance and functional requirements are really satisfied. B. Detection Controls Preventing any threat to assets is clearly not possible and this is true, in particular, for IACS, where the dynamics of changes in h/w and s/w during the system lifetime is by far slower than the evolution of attack methods and technologies (see Table I). Keeping the system under continuous monitoring is then essential, both to rapidly notify the people in charge when dangerous situations occur, and to trigger (automatic) reactions for fault mitigation and healing. In fact, this is the primary goal of intrusion detection controls. Intrusion detection in computer networks is a well-known and established issue, which dates back to the eighties at least. Intrusion Detection Systems are designed to quickly discover the presence of attacks in progress or the occurrence of failures, by means of some evidence gathered from the live system, while it is performing its operations. Not only ideal IDSs should avoid that some attacks go undetected (false negatives), but they are also requested not to cause false positives, that is, alarms raised when no attack is in progress. In the following, we will call ac-curacy, this characteristic which is one of the main areas where continuous research and development are needed. Table VII: Main Methodologies For Detection Signature- based techniques require the explicit definition of ―signatures‖ of known attacks in terms of characteristic mes-sage patterns. Unfortunately, two main drawbacks have to be carefully considered in this case: first the exact characterization of attacks is a difficult task which can signi ficantly affect the effectiveness of detection. This means that the derivation of suitable signatures , has to start almost from scratch. 1.Stateless IDSs: DoS attacks to a generic control system (sampling rate equal to 0.02 s, controller and plant intercon-nected through the Internet) were simulated in . In particular, the characterization in terms of packet delays, jitters, and losses and their correlation to the rise and settling times of the controlled system were used to measure how much the system performance could be affected by DoS. Authors then proposed to deploy IDSs on the network routers, and showed how the rise and settling times of the controlled system improved under the same attacks. 2) Stateful IDSs: When information concerning the whole system is exploited, both attacks and faults can be detected and even predicted. This also enables IDSs to reason about the attacker’s goals instead of the attack mechanisms, a characteristic which can be particularly useful when dealing with threats conceived to slowly shift the system behavior to an unsafe state. Finally, a rough estimation of main IDS issues covered in re-search papers could be derived in a way similar to the discussion already carried out in the prevention subsection. In the case of IDSs, however, accuracy and performance impact are the two topics of utmost importance. From this point of view less than 67% of the punlished papers has dealt with accuracy, whereas performance has been explicitly tackled and discussed only by 27% of them. These two indicators are sufficiently low to conclude that much more effort and future studies are strongly needed in this area.
  • 6. Privacy Protection in Distributed Industrial System DOI: 10.9790/0661-17223742 www.iosrjournals.org 42 | Page VI. Conclusion This paper has dealt with the current situation of security in IACS. We have shown that, nowadays, security in IACS as a never-ending cyclical process that moves through a well-defined set of main phases, . Each phase has then been addressed in this paper, with respect to the current state of the art, to give an idea of the problems and scientific/technical challenges that have to be tackled in order to reduce the security risks under a predefined, acceptable threshold. In this framework, the study and development of automatic/ semiautomatic analysis IT techniques and tools that are able to deal with security at a global (system) level, can be of significant help in making each phase of the management process easier and more efficient. Indeed, we think that, because of the complexity and size of many IACS, quick and effective security management decisions and (re)actions will become harder to take in the near future, so that the scientific community is expected to propose and develop new advanced techniques to support IACS security experts and managers in carrying out their tasks. References [1]. Security for Industrial Automation and Control Systems Part 1: Termi-nology, Concepts, Models, ANSI/ISA Std. 99.00.01-2007. [2]. K. Stouffer, J. Falco, and K. Scarfone, ―Guide to Industrial Control Systems (ICS) Security,‖ NIST SP 800-82, 2008. [3]. D. Dzung, M. Naedele, T. P. von Hoff, and M. Crevatin, ―Security for industrial control systems,‖ Proc. IEEE, vol. 93, no. 6, pp. 1152–1177, Jun. 2005. [4]. G. N. Ericsson, ―Cyber security and power system communica-tion—Essential parts of a smart grid infrastructure,‖ IEEE Trans. Power Del., vol. 25, no. 3, pp. 1501–1507, Aug. 2011. [5]. Security for Industrial Automation and Control Systems Part 1: Termi-nology, Concepts, Models, ANSI/ISA Std. 99.00.01-2007. [6]. K. Stouffer, J. Falco, and K. Scarfone, ―Guide to Industrial Control Systems (ICS) Security,‖ NIST SP 800-82, 2008. [7]. D. Dzung, M. Naedele, T. P. von Hoff, and M. Crevatin, ―Security for industrial control systems,‖ Proc. IEEE, vol. 93, no. 6, pp. 1152–1177, Jun. 2005. [8]. G. N. Ericsson, ―Cyber security and power system communica-tion—Essential parts of a smart grid infrastructure,‖ IEEE Trans. Power Del., vol. 25, no. 3, pp. 1501–1507, Aug. 2010. Author’s Biography P.Sheela Rani, is an Assistant Professor, in Department of Information Technology at Panimalar Institute of Technology , Chennai, India . She received M.E degree in Computer Science & Engineering dept in 2011 at Anna University, Trichy, India. She has 8 years experience in Teaching.. She is the Life member of ISTE. Area of Interest are Network Security, Computer Networks, Cryptography & Security. [rpsheelarani2014@gmail.com]. Malavika is a third year student in the Department of Information Technology at Panimalar Institute of Technology , Chennai, India. Area of Interest is Computer Networks. (malavika.guru@gmail.com). D.Menaka is a third year student in the Department of Information Technology at Panimalar Institute of Technology , Chennai, India. Area of Interest are Computer Networks and Network Security. (menu.rosh95@gmail.com) Author’s formal photo