Security Architecture for Point-to-Point Splitting Protocols - CASYS Accéder directement au contenu
Communication Dans Un Congrès Année : 2017

Security Architecture for Point-to-Point Splitting Protocols

Résumé

The security of industrial supervisory control and data acquisition systems (SCADA) has become a major concern since the Stuxnet worm in 2010. As these systems are connected to the physical world, this makes them possibly hazardous if a malicious attacker is able to take over their control. SCADA can live up to 40 years, are particularly hard to patch, and quite often have no security feature at all. Thus, rather than securing them, network segregation is often used to prevent attackers from entering the industrial system. In this paper, we propose a generic solution: embed a point-to-point splitting protocol within a physical device, thus able to physically isolate networks, perform deep packet inspection and also provide encryption if necessary. We obtain a kind of next generation firewall, encompassing at least both diode and firewall features, for which conformity to security policies can be ensured. Then we define a set of associated security properties for such devices and the requirements for such a device's security architecture and filtering rules. Finally, we propose a secure hardware implementation.
Fichier principal
Vignette du fichier
secarch.pdf (335.58 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01657605 , version 1 (11-12-2017)

Identifiants

  • HAL Id : hal-01657605 , version 1

Citer

Benoit Badrignans, Vincent Danjean, Jean-Guillaume Dumas, Philippe Elbaz-Vincent, Sabine Machenaud, et al.. Security Architecture for Point-to-Point Splitting Protocols. WCICSS 2017 - IEEE World Congress on Industrial Control Systems Security, Dec 2017, Cambridge, United Kingdom. ⟨hal-01657605⟩
971 Consultations
180 Téléchargements

Partager

Gmail Facebook X LinkedIn More