Please use this identifier to cite or link to this item: http://hdl.handle.net/10316/84963
DC FieldValueLanguage
dc.contributor.authorGraveto, Vitor-
dc.contributor.authorRosa, Luis-
dc.contributor.authorCruz, Tiago José dos Santos Martins da-
dc.contributor.authorSimões, Paulo-
dc.date.accessioned2019-02-22T16:07:31Z-
dc.date.available2019-02-22T16:07:31Z-
dc.date.issued2018-10-22-
dc.identifier.issn1874-5482pt
dc.identifier.urihttp://hdl.handle.net/10316/84963-
dc.description.abstractSupervisory Control and Data Acquisition (SCADA) systems, which are often used in several types of Essential Systems and Critical Infrastructures, depend on control devices such as Programmable Logic Controllers, Remote Terminal Units and Intelligent Electronic Devices. Such devices, which are deployed at the edge of the SCADA infrastructure, directly interface with the physical processes under control. They are often based on embedded systems with limited capabilities and exposed to significant security and safety-related risks, as demonstrated by past incidents such as Stuxnet. However, despite the recognized relevance of those edge devices, they usually lack monitoring mechanisms able to detect device anomalies and/or cyber-physical threats. In this paper we propose a novel approach for stealth monitoring of those control devices, for purposes of security and safety management. This approach builds on cost-effective probes, which we designate as Shadow Security Units (SSU), directly attached to the monitored control devices. This privileged positioning enables the direct and fine-grained observation of both physical inputs/outputs (i.e. the physical processes under control) and network communication flows -- allowing the exploitation of various novel monitoring approaches able to address sophisticated security threats not noticeable otherwise. Moreover, the SSU approach is not limited to SCADA scenarios, being also applicable to similar domains such as the Internet of Things (IoT), Avionics and Self-Driving systems.pt
dc.description.sponsorshipEuropean Commission H2020 ; 700581 - ATENA - Advanced Tools to assEss and mitigate the criticality of ICT compoNents and their dependencies over Critical InfrAstructurespt
dc.language.isoengpt
dc.publisherElsevierpt
dc.relationinfo:eu-repo/grantAgreement/EC/H2020/700581/EU//ATENApt
dc.rightsopenAccesspt
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/pt
dc.subjectSafety and security monitoringpt
dc.subjectAnomaly detectionpt
dc.subjectSCADApt
dc.subjectIndustrial Automation and Control Systemspt
dc.titleA stealth monitoring mechanism for cyber-physical systemspt
dc.typearticle-
degois.publication.firstPage126pt
degois.publication.lastPage143pt
degois.publication.locationInternational Journal of Critical Infrastructure Protectionpt
dc.peerreviewedyespt
dc.identifier.doi10.1016/j.ijcip.2018.10.006pt
degois.publication.volume24pt
dc.date.embargo2018-10-22*
dc.date.periodoembargo0pt
item.languageiso639-1en-
item.grantfulltextopen-
item.fulltextCom Texto completo-
Appears in Collections:I&D CISUC - Artigos em Revistas Internacionais
Files in This Item:
File Description SizeFormat
SSUv2_no_highlight_prp.pdf1.6 MBAdobe PDFView/Open
Show simple item record

Page view(s)

76
checked on Oct 22, 2019

Download(s)

125
checked on Oct 22, 2019

Google ScholarTM

Check

Altmetric

Dimensions


This item is licensed under a Creative Commons License Creative Commons