Survivable SCADA Via Intrusion-Tolerant Replication

被引:33
|
作者
Kirsch, Jonathan [1 ]
Goose, Stuart [1 ]
Amir, Yair [2 ]
Wei, Dong [3 ]
Skare, Paul [4 ]
机构
[1] Siemens Technol Business Ctr, Berkeley, CA 94704 USA
[2] Johns Hopkins Univ, Baltimore, MD 21218 USA
[3] Siemens Corp, Corp Technol, Princeton, NJ 08540 USA
[4] Pacific NW Natl Lab, Richland, WA 99352 USA
关键词
Cyber attack; fault tolerance; reliability; re-silience; SCADA systems; survivability; BYZANTINE FAULT-TOLERANCE;
D O I
10.1109/TSG.2013.2269541
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Providers of critical infrastructure services strive to maintain the high availability of their SCADA systems. This paper reports on our experience designing, architecting, and evaluating the first survivable SCADA system-one that is able to ensure correct behavior with minimal performance degradation even during cyber attacks that compromise part of the system. We describe the challenges we faced when integrating modern intrusion-tolerant protocols with a conventional SCADA architecture and present the techniques we developed to overcome these challenges. The results illustrate that our survivable SCADA system not only functions correctly in the face of a cyber attack, but that it also processes in excess of 20 000 messages per second with a latency of less than 30 ms, making it suitable for even large-scale deployments managing thousands of remote terminal units.
引用
收藏
页码:60 / 70
页数:11
相关论文
共 50 条
  • [1] Intrusion-tolerant server architecture for survivable services
    Min B.J.
    [J]. Journal of Supercomputing, 2005, 33 (01): : 93 - 102
  • [2] Intrusion-tolerant server architecture for survivable services
    Min, YJ
    [J]. JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 93 - 102
  • [3] Intrusion-Tolerant Server Architecture for Survivable Services
    Byoung Min Joon
    [J]. The Journal of Supercomputing, 2005, 33 (1) : 93 - 102
  • [4] Deploying Intrusion-Tolerant SCADA for the Power Grid
    Babay, Amy
    Schultz, John
    Tantillo, Thomas
    Beckley, Samuel
    Jordan, Eamon
    Ruddell, Kevin
    Jordan, Kevin
    Amir, Yair
    [J]. 2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 328 - 335
  • [5] Secure intrusion-tolerant replication on the Internet
    Cachin, C
    Poritz, JA
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
  • [6] Intrusion-tolerant based survivable model of database system
    Zhu, JM
    Wang, C
    Ma, JF
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03) : 481 - 484
  • [7] Probabilistic validation of an intrusion-tolerant replication system
    Singh, S
    Cukier, M
    Sanders, WH
    [J]. 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 615 - 624
  • [8] Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
    Babay, Amy
    Tantillo, Thomas
    Aron, Trevor
    Platania, Marco
    Amir, Yair
    [J]. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 255 - 266
  • [9] Towards a Practical Survivable Intrusion Tolerant Replication System
    Platania, Marco
    Obenshain, Daniel
    Tantillo, Thomas
    Sharma, Ricky
    Amir, Yair
    [J]. 2014 IEEE 33RD INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2014, : 242 - 252
  • [10] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224