An architecture for SCADA network forensics

被引:0
|
作者
Kilpatrick, T. [1 ]
Gonzalez, J. [1 ]
Chandia, R. [1 ]
Papa, M. [1 ]
Shenoi, S. [1 ]
机构
[1] Univ Tulsa, Tulsa, OK 74104 USA
来源
关键词
process control systems; SCADA networks; network forensics;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Supervisory control and data acquisition (SCADA.) systems are widely used in industrial control and automation. Modern SCADA protocols often employ TCP/IP to transport sensor data and control signals. Meanwhile, corporate IT infrastructures are interconnecting with previously isolated SCADA networks. The use of TCP/IP as a carrier protocol and the interconnection of IT and SCADA networks raise serious security issues. This paper describes an architecture for SCADA network forensics. In addition to supporting forensic investigations of SCADA network incidents, the architecture incorporates mechanisms for monitoring process behavior, analyzing trends and optimizing plant performance.
引用
收藏
页码:273 / +
页数:3
相关论文
共 50 条
  • [31] Network forensics and the inside job
    Security Strategy, CA EMEA
    Netw. Secur., 2006, 12 (11-13):
  • [32] Network forensics and challenges for cybersecurity
    Mazurczyk, Wojciech
    Szczypiorski, Krzysztof
    Tian, Hui
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 345 - 346
  • [33] Modeling the network forensics behaviors
    Ren, Wei
    Jin, Hai
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 3 - 10
  • [34] Research on the Architecture Model of Volatile Data Forensics
    Hu, Liang
    Zhang, XiaoLu
    Wang, Feng
    Wang, WenBo
    Zhao, Kuo
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 4254 - 4258
  • [35] BlockConfess: Towards an Architecture for Blockchain Constraints and Forensics
    Kirrane, Sabrina
    Di Ciccio, Claudio
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 539 - 544
  • [36] Towards a Unified eDiscovery Forensics Architecture (UEFA)
    Silaa, Julius
    Muyingi, Hippolyte
    Gamundani, Attlee
    Masake, Pilisano
    2024 IST-AFRICA CONFERENCE, 2024,
  • [37] Component-based Design for SCADA Architecture
    Phan Duy Anh
    Truong Dinh Chau
    INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2010, 8 (05) : 1141 - 1147
  • [38] Developing a Secure Cyber Ecosystem for SCADA Architecture
    Kumar, Sanjay
    Gaur, Niharika
    Kumar, Aditya
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 559 - 562
  • [39] Component-Oriented Architecture for SCADA System
    Anh, Phan Duy
    Chau, Truong Dinh
    2009 7TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1 AND 2, 2009, : 422 - 427
  • [40] Applying Digital Forensics to Service Oriented Architecture
    Akremi, Aymen
    Sallay, Hassen
    Rouached, Mohsen
    Bouaziz, Rafik
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2020, 17 (01) : 17 - 42