3 research outputs found

    Security Architecture for Point-to-Point Splitting Protocols

    Get PDF
    International audienceThe security of industrial supervisory control and data acquisition systems (SCADA) has become a major concern since the Stuxnet worm in 2010. As these systems are connected to the physical world, this makes them possibly hazardous if a malicious attacker is able to take over their control. SCADA can live up to 40 years, are particularly hard to patch, and quite often have no security feature at all. Thus, rather than securing them, network segregation is often used to prevent attackers from entering the industrial system. In this paper, we propose a generic solution: embed a point-to-point splitting protocol within a physical device, thus able to physically isolate networks, perform deep packet inspection and also provide encryption if necessary. We obtain a kind of next generation firewall, encompassing at least both diode and firewall features, for which conformity to security policies can be ensured. Then we define a set of associated security properties for such devices and the requirements for such a device's security architecture and filtering rules. Finally, we propose a secure hardware implementation

    Etat de l'art sur les méthodes de modélisation pour les infrastructures critiques interdépendantes

    Get PDF
    International audienceLa modélisation des infrastructures critiques interdépendantes est un outil précieux pour l'identification de leurs modes de défaillance les plus critiques et d'en trouver des parades. Différentes approches ont déjà été utilisées pour modéliser les infrastructures critiques ainsi que leurs interdépendances en vue de leur sécurisation. Elles permettent de caractériser les systèmes critiques interconnectés afin de faciliter l'analyse de risques et la définition de méthodes et de mécanismes locaux et globaux de sécurisation efficaces. Cet article présente un état de l'art des méthodes adaptées à la modélisation des réseaux électriques et à leur dépendance aux systèmes TIC associés. Nous présenterons des approches basées sur la théorie des réseaux (ou systèmes) complexes, sur des outils spécialisés communicants (co-simulateur), sur des agents, sur les réseaux de Petri ou sur l'utilisation des BDMP (Boolean logic Driven Markov Processes.

    Security Architecture for Point-to-Point Splitting Protocols

    Get PDF
    International audienceThe security of industrial supervisory control and data acquisition systems (SCADA) has become a major concern since the Stuxnet worm in 2010. As these systems are connected to the physical world, this makes them possibly hazardous if a malicious attacker is able to take over their control. SCADA can live up to 40 years, are particularly hard to patch, and quite often have no security feature at all. Thus, rather than securing them, network segregation is often used to prevent attackers from entering the industrial system. In this paper, we propose a generic solution: embed a point-to-point splitting protocol within a physical device, thus able to physically isolate networks, perform deep packet inspection and also provide encryption if necessary. We obtain a kind of next generation firewall, encompassing at least both diode and firewall features, for which conformity to security policies can be ensured. Then we define a set of associated security properties for such devices and the requirements for such a device's security architecture and filtering rules. Finally, we propose a secure hardware implementation
    corecore