A review of model on malware detection and protection for the distributed control systems (Industrial control systems) in oil & gas sectors

2019 ◽  
Vol 22 (4) ◽  
pp. 531-540
Author(s):  
Yask ◽  
B. Suresh Kumar
2021 ◽  
Vol 29 (0) ◽  
pp. 559-571
Author(s):  
Takanori Machida ◽  
Dai Yamamoto ◽  
Yuki Unno ◽  
Hisashi Kojima

Author(s):  
Tobias Rauter ◽  
Johannes Iber ◽  
Christian Kreiner

Due to the need of increased cooperation and connectivity, security is getting a vital property of industrial control systems. Besides system hardening, the detection of security breaches in different subsystems has been becoming a research-focus recently. This chapter summarizes the work concerning anomaly detection at different system levels. The, a system that maintains availability and integrity of distributed control systems through automated reconfiguration in case of integrity violations is proposed. We aim to detect such integrity violations through integrity reporting. This is a well-known technology, albeit not widely used in real system because of scalability problems. In this chapter, three different remote attestation methods (binary, privilege and signature-based) are integrated into a remote terminal unit to analyze and discuss the benefits and drawbacks of each method. Depending on the actual RTU architecture and already in-place development and deployment processes, the integration of remote attestation may be feasible for industrial control systems.


Sign in / Sign up

Export Citation Format

Share Document