ebook img

Cyber-security of SCADA and Other Industrial Control Systems PDF

368 Pages·2016·9.311 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cyber-security of SCADA and Other Industrial Control Systems

Advances in Information Security 66 Edward J. M. Colbert Alexander Kott Editors Cyber-security of SCADA and Other Industrial Control Systems Advances in Information Security Volume 63 Series editor Sushil Jajodia, George Mason University, Fairfax, VA, USA More information about this series at h ttp://www.springer.com/series/5576 Edward J.M. Colbert • Alexander Kott Editors Cyber-security of SCADA and Other Industrial Control Systems Editors Edward J.M. Colbert Alexander Kott US Army Research Laboratory US Army Research Laboratory Adelphi , MD , USA Adelphi , MD , USA ISSN 1568-2633 Advances in Information Security ISBN 978-3-319-32123-3 ISBN 978-3-319-32125-7 (eBook) DOI 10.1007/978-3-319-32125-7 Library of Congress Control Number: 2016949384 © Springer International Publishing Switzerland 2016 T his work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. T he use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specifi c statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. T he publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG Switzerland Acknowledgements The authors of Chap. 4 would like to thank Aaron Sneary and Chris Sistrunk for their insightful comments on the chapter. The authors of Chap. 9 would like to state that permission was granted by the USACE Chief of Engineers to publish the material for Chap. 9 . The views and opin- ions expressed in this chapter are those of the individual authors and not those of the US Army, or other sponsor organizations. The authors of Chap. 1 3 would like to state that Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000. v Contents 1 Introduction and Preview ....................................................................... 1 Alexander Kott , Carlos Aguayo Gonzalez , and Edward J.M. Colbert 2 Components of Industrial Control Systems.......................................... 15 Daniel Sullivan, Eric Luiijf, and Edward J.M. Colbert 3 Wireless Infrastructure in Industrial Control Systems ....................... 29 Selcuk Uluagac , Kemal Akkaya , Apurva Mohan , Mehmet H. Cintuglu , Tarek Youssef , Osama Mohammed , and Daniel Sullivan 4 Operational Technology and Information Technology in Industrial Control Systems ................................................................ 51 Adam Hahn 5 Threats in Industrial Control Systems .................................................. 69 Eric Luiijf 6 Attacks on Industrial Control Systems ................................................. 95 Nick Evancich and Jason Li 7 Security Taxonomies of Industrial Control Systems............................ 111 Angelyn S. Flowers , Sidney C. Smith , and Alessandro Oltramari 8 Cyber Risk in Industrial Control Systems ............................................ 133 Matthew H. Henry , David R. Zaret , J. Ryan Carr , J. Daniel G ordon , and Ryan M. Layer 9 Security Metrics in Industrial Control Systems ................................... 167 Zachary A. Collier , Mahesh Panwar , Alexander A. Ganin , Alexander Kott , and Igor Linkov 10 Situational Awareness in Industrial Control Systems ......................... 187 Blaine Hoffman , Norbou Buchler , Bharat Doshi , and Hasan Cam vii viii Contents 11 Intrusion Detection in Industrial Control Systems .............................. 209 Edward J.M. Colbert and Steve Hutchinson 12 Cyber Physical Intrusion Detection ...................................................... 239 Carlos Aguayo Gonzalez and Jeffrey Reed 13 Experimental Methods for Control System Security Research .......... 253 Vincent Urias and Brian Van Leeuwen 14 Governance and Assessment Strategies for Industrial Control Systems....................................................................................... 279 Daryl Haegley 15 Responding to Attacks on Industrial Control Systems and SCADA Systems ............................................................................... 305 Frank Honkus III 16 In Conclusion: The Future Internet of Things and Security of Its Control Systems ............................................................................. 323 Misty Blowers , Jose Iribarne , Edward J.M. Colbert , and Alexander Kott About the Authors Kemal Akkaya (Chap. 3 ) is an associate professor in the Department of Electrical and Computer Engineering at Florida International University (FIU). He received his Ph.D. in computer science from the University of Maryland in Baltimore County in 2005, after which he held assistant and associate professorships at the Department of Computer Science at Southern Illinois University (SIU) and a visiting professor- ship at the George Washington University. Dr. Akkaya currently leads the Advanced Wireless and Security Lab (ADWISE) in the ECE Department at FIU. His current research interests include security and privacy, energy-aware routing, topology con- trol, and quality-of-service issues in a variety of wireless networks such as sensor networks, multimedia sensor networks, smart grid communication networks, and vehicular networks. Dr. Akkaya is a senior member of the IEEE. He is the area edi- tor of Elsevier A d Hoc Network journal and serves on the editorial board of IEEE Communications Surveys and Tutorials. He has served as the guest editor for the Journal of High Speed Networks , Computer Communications journal, and Elsevier Ad Hoc Networks journal and is in the TPC of many leading wireless networking conferences. He has published over 100 papers in peer-reviewed journal and confer- ences. He has received the “Top Cited” article award from Elsevier in 2010. Misty Blowers (Chap. 16 ) is the lead for in-house research in cyber operations at the US Air Force Research Laboratory, Information Directorate. She obtained her Ph.D. from the SUNY College of Environmental Science and Forestry in applied science and engineering and an M.S. in computer science from Syracuse University. She has extensive research experience in the fi elds of machine learning, big data analytics, industrial process design, systems engineering, cybersecurity, modeling, and simulation. She has authored over 50 publications and provided plenary talks on behavior analysis of manufacturing processes. She led a team of young engineers to launch a new start company which won the top award by a panel of new venture capitalist and local scientifi c leaders. Her patented technology has resulted in AFRL licenses across four different domains with potential for numerous more applica- tions and licenses currently being pursued. Dr. Blowers was named the 2014 Technologist of the Year by the Technical Association of Central New York. ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.