A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection

被引:2
|
作者
Henriques, Joao [1 ,2 ]
Caldeira, Filipe [2 ,3 ]
Cruz, Tiago [1 ]
Simoes, Paulo [1 ]
机构
[1] Univ Coimbra, Ctr Informat & Syst, Dept Informat Engn, P-3030290 Coimbra, Portugal
[2] Polytech Inst Viseu, CISeD Res Ctr Digital Serv, P-3504510 Viseu, Portugal
[3] Polytech Inst Viseu, Informat Dept, P-3504510 Viseu, Portugal
关键词
Critical infrastructure protection; industrial automation and control systems; cybersecurity; forensics; compliance auditing; DIGITAL FORENSICS; ANOMALY DETECTION; DETECTION FRAMEWORK; INTRUSION DETECTION; CLOUD; SECURITY; INFORMATION; PROVENANCE; CHALLENGES; TAXONOMY;
D O I
10.1109/ACCESS.2023.3348552
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The broadening dependency and reliance that modern societies have on essential services provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, Critical Infrastructures are attractive targets for cyberattacks, due to the potential for considerable impact, not just at the economic level but also in terms of physical damage and even loss of human life. Complementing traditional security mechanisms, forensics and compliance audit processes play an important role in ensuring Critical Infrastructure trustworthiness. Compliance auditing contributes to checking if security measures are in place and compliant with standards and internal policies. Forensics assist the investigation of past security incidents. Since these two areas significantly overlap, in terms of data sources, tools and techniques, they can be merged into unified Forensics and Compliance Auditing (FCA) frameworks. In this paper, we survey the latest developments, methodologies, challenges, and solutions addressing forensics and compliance auditing in the scope of Critical Infrastructure Protection. This survey focuses on relevant contributions, capable of tackling the requirements imposed by massively distributed and complex Industrial Automation and Control Systems, in terms of handling large volumes of heterogeneous data (that can be noisy, ambiguous, and redundant) for analytic purposes, with adequate performance and reliability. The achieved results produced a taxonomy in the field of FCA whose key categories denote the relevant topics in the literature. Also, the collected knowledge resulted in the establishment of a reference FCA architecture, proposed as a generic template for a converged platform. These results are intended to guide future research on forensics and compliance auditing for Critical Infrastructure Protection.
引用
收藏
页码:2409 / 2444
页数:36
相关论文
共 50 条
  • [41] Compliance with data protection laws using Hippocratic Database active enforcement and auditing
    Johnson, C. M.
    Grandison, T. W. A.
    IBM SYSTEMS JOURNAL, 2007, 46 (02) : 255 - 264
  • [42] CRITICAL INFORMATION INFRASTRUCTURE PROTECTION IN THE DEVELOPING WORLD
    Ellefsen, Ian
    von Solms, Sebastiaan
    CRITICAL INFRASTRUCTURE PROTECTION IV, 2010, 342 : 29 - +
  • [43] Virginia's Critical Infrastructure Protection Study
    Jones, EV
    Lyford, J
    Qazi, NK
    Solan, NJ
    Haimes, YY
    2003 IEEE SYSTEMS & INFORMATION ENGINEERING DESIGN SYMPOSIUM, 2003, : 177 - 182
  • [44] Critical infrastructure protection and the role of emergency services
    Rothery, Mike
    AUSTRALIAN JOURNAL OF EMERGENCY MANAGEMENT, 2005, 20 (02): : 45 - 50
  • [45] A Platform for Simulation and Analysis of Critical Infrastructure Protection
    Kuo, Li-Jung
    Fan, Chin-Feng
    Yih, Swu
    Kao, Yung-Yu
    Lin, Ching-Ting
    JOURNAL OF INTERNET TECHNOLOGY, 2009, 10 (02): : 145 - 153
  • [46] CRITICAL INFRASTRUCTURE PROTECTION: THREATS MINING AND ASSESSMENT
    Digioia, Giusj
    Panzieri, Stefano
    INTERNATIONAL DEFENSE AND HOMELAND SECURITY SIMULATION WORKSHOP (DHSS 2012), 2012, : 67 - 72
  • [47] Trust and Reputation Management for Critical Infrastructure Protection
    Caldeira, Filipe
    Monteiro, Edmundo
    Simoes, Paulo
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 39 - 47
  • [48] Critical networked infrastructure protection from adversaries
    Quijano, Eduardo G.
    Rios Insua, David
    Cano, Javier
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 179 : 27 - 36
  • [49] Systemic challenges for critical information infrastructure protection
    Masera, M
    Cyberspace Security and Defense: Research Issues, 2005, 196 : 57 - 73
  • [50] On Critical Infrastructure Protection in America and Inspiration to China
    Pei Yan
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (5TH), VOL III, 2009, : 61 - 67