An architecture for SCADA network forensics

被引:0
|
作者
Kilpatrick, T. [1 ]
Gonzalez, J. [1 ]
Chandia, R. [1 ]
Papa, M. [1 ]
Shenoi, S. [1 ]
机构
[1] Univ Tulsa, Tulsa, OK 74104 USA
来源
关键词
process control systems; SCADA networks; network forensics;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Supervisory control and data acquisition (SCADA.) systems are widely used in industrial control and automation. Modern SCADA protocols often employ TCP/IP to transport sensor data and control signals. Meanwhile, corporate IT infrastructures are interconnecting with previously isolated SCADA networks. The use of TCP/IP as a carrier protocol and the interconnection of IT and SCADA networks raise serious security issues. This paper describes an architecture for SCADA network forensics. In addition to supporting forensic investigations of SCADA network incidents, the architecture incorporates mechanisms for monitoring process behavior, analyzing trends and optimizing plant performance.
引用
收藏
页码:273 / +
页数:3
相关论文
共 50 条
  • [1] SCADA network forensics of the PCCC protocol
    Senthivel, Saranyan
    Ahmed, Irfan
    Roussev, Vassil
    DIGITAL INVESTIGATION, 2017, 22 : S57 - S65
  • [2] Network Forensics for Encrypted SCADA Device Programming Traffic
    Mellish, Robert
    Graham, Scott
    Dunlap, Stephen
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 465 - 472
  • [3] A Trust System Architecture for SCADA Network Security
    Coates, Gregory M.
    Hopkinson, Kenneth M.
    Graham, Scott R.
    Kurkowski, Stuart H.
    IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (01) : 158 - 169
  • [4] Wireless Sensor Network Architecture for SCADA System: Review
    Gelogo, Yvette E.
    Kim, Tai-hoon
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (10): : 3343 - 3350
  • [5] Advance hybrid key management architecture for SCADA network security
    Rezai, Abdalhossein
    Keshavarzi, Parviz
    Moravej, Zahra
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4358 - 4368
  • [6] Review: Distributed system network architecture for securing SCADA system
    Tolentino, Randy S.
    Kim, Tai-hoon
    International Journal of Smart Home, 2010, 4 (01): : 13 - 22
  • [7] Control systems/SCADA forensics, what's the difference?
    van der Knijff, R. M.
    DIGITAL INVESTIGATION, 2014, 11 (03) : 160 - 174
  • [8] RESEARCH ON FNN-BASED SECURITY DEFENCE ARCHITECTURE MODEL OF SCADA NETWORK
    Yang, Li
    Cao, Xiedong
    Li, Jie
    Wang, Aomin
    Tan, Weibin
    Yu, Zhijun
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1367 - 1371
  • [9] SCADA Testbed for Vulnerability Assessments, Penetration Testing and Incident Forensics
    Krishnan, Sundar
    Wei, Mingkui
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [10] Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems
    Awad, Rima Asmar
    Beztchi, Saeed
    Smith, Jared M.
    Lyles, Bryan
    Prowell, Stacy
    4TH ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2018), 2018, : 1 - 8