Information security for industrial applications

Christian Horn, Technische Universität Berlin, Technische Universität Berlin, Jörg Krüger, Jean-Pierre Seifert
The society that we are living in today makes essential demands on the security of supply for people, especially in large urban metropolitan areas. At the same time, attempts are being made to meet these requirements with the help of technological developments, particularly in automation technology. The implementation of information and communication systems for smart control of machines and plants in domains such as critical infrastructures, goods production, transport or home is making
more » ... ing progress. This cyber infrastructure as a secondary infrastructure has reached a high degree of complexity and automation and the dependence of primary infrastructures on it is constantly growing. Securing these infrastructures, especially in security-critical areas, is one of the central challenges for operators. Attacks on these cyber infrastructures in security-critical areas such as Stuxnet or Duqu demonstrated the fundamental vulnerability of even encapsulated systems. The increasing connection to the Internet, for example via wireless technologies at the field level, further increases the vulnerability of these systems. This applies not only to the individual layers of the IT architecture and the control technology installed, but also to organizational structures and work processes as well as the security technology, which is intended to physically protect systems from unauthorized access. This increasing threat situation to systems due to increasing expansion of attack surfaces requires new methods for detection of attacks in order to be able to react efficiently and in a controlled manner. This work analyses the current state of basic principles, threats, attack models and countermeasures for automation infrastructures. It is revealed that measures are particularly necessary to detect anomalies and that related work has not been developed with practical application context requirements in mind. Therefore, the need of operators to develop a methodology to derive a detection concept was addressed. This methodology [...]
doi:10.14279/depositonce-8551 fatcat:zsbvvqdp6vai7l53xsfhxorvku