Implementation of Defense in Depth Strategy to Secure Industrial Control System in Critical Infrastructures

Tschroub Abdelghani
{"title":"Implementation of Defense in Depth Strategy to Secure Industrial Control System in Critical Infrastructures","authors":"Tschroub Abdelghani","doi":"10.11648/J.AJAI.20190302.11","DOIUrl":null,"url":null,"abstract":"The goal of this communication is to examine the implementation of defense in depth strategy to secure the industrial control systems (ICS) from threats, hackers, vandals and other ones that can damage the critical infrastructures (gas transportation network, power transmission network, power generation, power distribution grids, air traffic, petrochemical industries, rail traffic, military industries) and others big infrastructures that affect large number of persons and security of nations [1]. The defense in depth concept ensures the physical access protection of the infrastructure, using network access control system (NAC) and traditional security measures, and implements policies and procedures that deal training and cybersecurity awareness programs, risk assessment (analyzing and documenting), and the plan of security. The philosophy of defense in depth uses also the IT technologies in order to ensure separation and segmentations of the networks to the VLANs, demilitarized zones, VPN, using firewalls, switch and routers. The hardening of different systems installed like routers, firewalls, switches and other devices on the network such as SCADA servers is a very sensitive operation of defense in depth. The last important operations are monitoring and maintenance, the monitoring serve to detect and stop intrusions attempts before they can damage the control system with using detection and protection system (IDS/IPS), and the maintenance operations control system (soft and hard), schedule updating of anti-virus software on different devices installed in the network like (computers, SCADA servers, routers, switch and other devices). The defense-in-depth recommendations described in this document can decrease the risk of attacks can target industrial network architectures, like VLAN hopping, SQL injection on SCADA, IP spoofing and DoS (denies of service) and others ones. The risk of attacks can use a common point of access as point of failures (RTU, corporate VPNs, database links, wireless communication, and IT controlled communication equipment). The implementation strict of the defense in depth concept can avoid important damage of critical infrastructures such as loss of production, damage to plant, impact on reputation, impact of health, impact of safety, impact of environment and impact on nation’s security.","PeriodicalId":404597,"journal":{"name":"American Journal of Artificial Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"American Journal of Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11648/J.AJAI.20190302.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

The goal of this communication is to examine the implementation of defense in depth strategy to secure the industrial control systems (ICS) from threats, hackers, vandals and other ones that can damage the critical infrastructures (gas transportation network, power transmission network, power generation, power distribution grids, air traffic, petrochemical industries, rail traffic, military industries) and others big infrastructures that affect large number of persons and security of nations [1]. The defense in depth concept ensures the physical access protection of the infrastructure, using network access control system (NAC) and traditional security measures, and implements policies and procedures that deal training and cybersecurity awareness programs, risk assessment (analyzing and documenting), and the plan of security. The philosophy of defense in depth uses also the IT technologies in order to ensure separation and segmentations of the networks to the VLANs, demilitarized zones, VPN, using firewalls, switch and routers. The hardening of different systems installed like routers, firewalls, switches and other devices on the network such as SCADA servers is a very sensitive operation of defense in depth. The last important operations are monitoring and maintenance, the monitoring serve to detect and stop intrusions attempts before they can damage the control system with using detection and protection system (IDS/IPS), and the maintenance operations control system (soft and hard), schedule updating of anti-virus software on different devices installed in the network like (computers, SCADA servers, routers, switch and other devices). The defense-in-depth recommendations described in this document can decrease the risk of attacks can target industrial network architectures, like VLAN hopping, SQL injection on SCADA, IP spoofing and DoS (denies of service) and others ones. The risk of attacks can use a common point of access as point of failures (RTU, corporate VPNs, database links, wireless communication, and IT controlled communication equipment). The implementation strict of the defense in depth concept can avoid important damage of critical infrastructures such as loss of production, damage to plant, impact on reputation, impact of health, impact of safety, impact of environment and impact on nation’s security.
实施纵深防御战略保障关键基础设施工业控制系统安全
本次通信的目标是检查实施纵深防御战略,以确保工业控制系统(ICS)免受威胁,黑客,破坏者和其他可能破坏关键基础设施的威胁(天然气运输网络,输电网络,发电,配电网,空中交通,石化工业,铁路交通)。军事工业)和其他影响大量人员和国家安全的大型基础设施[1]。纵深防御概念通过使用网络访问控制系统(NAC)和传统安全措施,确保基础设施的物理访问保护,并实施处理培训和网络安全意识计划、风险评估(分析和记录)和安全计划的策略和程序。纵深防御的理念还使用IT技术,以确保网络的分离和分割到vlan,非军事区,VPN,使用防火墙,交换机和路由器。对安装在网络上的路由器、防火墙、交换机和其他设备(如SCADA服务器)的不同系统进行加固是一项非常敏感的纵深防御操作。最后一个重要的操作是监控和维护,监控服务于检测和保护系统(IDS/IPS),在入侵企图破坏控制系统之前检测和阻止入侵企图,维护控制系统(软、硬),定时更新安装在网络中的不同设备(计算机、SCADA服务器、路由器、交换机等设备)上的杀毒软件。本文档中描述的深度防御建议可以降低攻击的风险,这些攻击可以针对工业网络架构,如VLAN跳变,SCADA上的SQL注入,IP欺骗和DoS(拒绝服务)等。攻击的风险可以使用公共访问点作为故障点(RTU、公司vpn、数据库链接、无线通信和IT控制的通信设备)。实施严格的纵深防御理念,可以避免对生产的损失、对工厂的破坏、对声誉的影响、对健康的影响、对安全的影响、对环境的影响、对国家安全的影响等关键基础设施的重要损害。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信