A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection

被引:2
|
作者
Henriques, Joao [1 ,2 ]
Caldeira, Filipe [2 ,3 ]
Cruz, Tiago [1 ]
Simoes, Paulo [1 ]
机构
[1] Univ Coimbra, Ctr Informat & Syst, Dept Informat Engn, P-3030290 Coimbra, Portugal
[2] Polytech Inst Viseu, CISeD Res Ctr Digital Serv, P-3504510 Viseu, Portugal
[3] Polytech Inst Viseu, Informat Dept, P-3504510 Viseu, Portugal
关键词
Critical infrastructure protection; industrial automation and control systems; cybersecurity; forensics; compliance auditing; DIGITAL FORENSICS; ANOMALY DETECTION; DETECTION FRAMEWORK; INTRUSION DETECTION; CLOUD; SECURITY; INFORMATION; PROVENANCE; CHALLENGES; TAXONOMY;
D O I
10.1109/ACCESS.2023.3348552
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The broadening dependency and reliance that modern societies have on essential services provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, Critical Infrastructures are attractive targets for cyberattacks, due to the potential for considerable impact, not just at the economic level but also in terms of physical damage and even loss of human life. Complementing traditional security mechanisms, forensics and compliance audit processes play an important role in ensuring Critical Infrastructure trustworthiness. Compliance auditing contributes to checking if security measures are in place and compliant with standards and internal policies. Forensics assist the investigation of past security incidents. Since these two areas significantly overlap, in terms of data sources, tools and techniques, they can be merged into unified Forensics and Compliance Auditing (FCA) frameworks. In this paper, we survey the latest developments, methodologies, challenges, and solutions addressing forensics and compliance auditing in the scope of Critical Infrastructure Protection. This survey focuses on relevant contributions, capable of tackling the requirements imposed by massively distributed and complex Industrial Automation and Control Systems, in terms of handling large volumes of heterogeneous data (that can be noisy, ambiguous, and redundant) for analytic purposes, with adequate performance and reliability. The achieved results produced a taxonomy in the field of FCA whose key categories denote the relevant topics in the literature. Also, the collected knowledge resulted in the establishment of a reference FCA architecture, proposed as a generic template for a converged platform. These results are intended to guide future research on forensics and compliance auditing for Critical Infrastructure Protection.
引用
收藏
页码:2409 / 2444
页数:36
相关论文
共 50 条
  • [21] International Journal of Critical Infrastructure Protection
    Shenoi, Sujeet
    International Journal of Critical Infrastructure Protection, 2013, 6 (02) : 61 - 62
  • [22] Resilience Parameters for Critical Infrastructure Protection
    Fuchs, P.
    Kraus, J.
    PROCEEDINGS OF THE 20TH INTERNATIONAL SCIENTIFIC CONFERENCE TRANSPORT MEANS 2016, 2016, : 804 - 808
  • [23] Theoretical Aspects of Critical Infrastructure Protection
    Hofreiter, Ladislav
    Zvakova, Zuzana
    DURABILITY OF CRITICAL INFRASTRUCTURE, MONITORING AND TESTING, ICDCF 2016, 2017, : 139 - 147
  • [24] Models of critical information infrastructure protection
    Assaf, Dan
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 : 6 - 14
  • [25] On the notion of "Partnership" in Critical Infrastructure Protection
    Wiater, Patricia
    EUROPEAN JOURNAL OF RISK REGULATION, 2015, 6 (02) : 255 - 262
  • [26] CRITICAL INFRASTRUCTURE PROTECTION - STRATEGIC OPPORTUNITIES
    Pavlov, Georgi
    Gechkova, Teodora
    Kaleeva, Tiana
    INTERNATIONAL JOURNAL FOR QUALITY RESEARCH, 2025, 19 (01) : 281 - 296
  • [27] CRITICAL INFRASTRUCTURE PROTECTION - CURRENT CHALLENGES
    Fifoiu, Dan
    ROMANIAN JOURNAL OF EUROPEAN AFFAIRS, 2010, 10 (04) : 93 - 105
  • [28] Basic Principles of Critical Infrastructure Protection
    Stoller, J.
    Dvorak, P.
    Turo, T.
    Zezulova, E.
    TRANSPORT MEANS 2018, PTS I-III, 2018, : 267 - 271
  • [29] Critical infrastructure protection: The vulnerability conundrum
    Murray, Alan T.
    Grubesic, Tony H.
    TELEMATICS AND INFORMATICS, 2012, 29 (01) : 56 - 65
  • [30] Seismic Barrier Protection of Critical Infrastructure
    Haupt, Robert
    Liberman, Vladimir
    Rothschild, Mordechai
    2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2017,