scholarly journals A security metric for assessing the security level of critical infrastructures

Author(s):  
Francesco Delli Priscoli ◽  
Vincenzo Suraci ◽  
Roberto Germanà ◽  
Alessandro Giuseppi ◽  
Andrea Tortorelli ◽  
...  
Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3092 ◽  
Author(s):  
Apostolos P. Fournaris ◽  
Charis Dimopoulos ◽  
Konstantinos Lampropoulos ◽  
Odysseas Koufopavlou

Critical infrastructures and associated real time Informational systems need some security protection mechanisms that will be able to detect and respond to possible attacks. For this reason, Anomaly Detection Systems (ADS), as part of a Security Information and Event Management (SIEM) system, are needed for constantly monitoring and identifying potential threats inside an Information Technology (IT) system. Typically, ADS collect information from various sources within a CI system using security sensors or agents and correlate that information so as to identify anomaly events. Such sensors though in a CI setting (factories, power plants, remote locations) may be placed in open areas and left unattended, thus becoming targets themselves of security attacks. They can be tampering and malicious manipulated so that they provide false data that may lead an ADS or SIEM system to falsely comprehend the CI current security status. In this paper, we describe existing approaches on security monitoring in critical infrastructures and focus on how to collect security sensor–agent information in a secure and trusted way. We then introduce the concept of hardware assisted security sensor information collection that improves the level of trust (by hardware means) and also increases the responsiveness of the sensor. Thus, we propose a Hardware Security Token (HST) that when connected to a CI host, it acts as a secure anchor for security agent information collection. We describe the HST functionality, its association with a host device, its expected role and its log monitoring mechanism. We also provide information on how security can be established between the host device and the HST. Then, we introduce and describe the necessary host components that need to be established in order to guarantee a high security level and correct HST functionality. We also provide a realization–implementation of the HST overall concept in a FPGA SoC evaluation board and describe how the HST implementation can be controlled. In addition, in the paper, two case studies where the HST has been used in practice and its functionality have been validated (one case study on a real critical infrastructure test site and another where a critical industrial infrastructure was emulated in our lab) are described. Finally, results taken from these two case studies are presented, showing actual measurements for the in-field HST usage.


2021 ◽  
Vol 17 (1) ◽  
pp. 371-376
Author(s):  
Alexandru-Cristian SAMOILĂ

Abstract: Taking into account the need for computerisation and process automation within critical infrastructures, a whole process of choosing the most appropriate software technologies is born, both in terms of security, but also in terms of costs and development opportunities. This problem is encountered by all states, but also by private companies, has favoured the creation of an environment conducive to the development of computing technologies in three directions, namely: in-house software, open-source technologies and proprietary technologies. The current challenge is to find medium and long-term solutions for the rapid interconnection or redesign of these three types of information technology in order to process data from government systems, in order to perform complex analyses that can meet current needs, keeping in -an equable balance of costs and security level and identifying the most effective solution.


Author(s):  
Apostolos P. Fournaris ◽  
Charalambos Dimopoulos ◽  
Konstantinos Lampropoulos ◽  
Odysseas Koufopavlou

Critical Infrastructures and associated real time Informational systems need some security protection mechanisms that will be able to detect and respond to possible attacks. For this reason, Anomaly Detection Systems (ADS), as part of a Security Information and Event Management (SIEM) system, are needed for constantly monitoring and identifying potential threats inside an Information Technology (IT) System. Typically, ADS collect information from various sources within a CI system using security sensors or agents and correlate those information so as to identify anomaly events. Such sensors though in a CI setting (factories, power plants, remote locations) may be placed in open areas and left unattended thus becoming targets themselves of security attacks. They can be tampering and malicious manipulated so that they provide false data that may lead an ADS or SIEM system to falsely comprehend the CI current security status. In this paper, we describe existing approaches on security monitoring in critical infrastructures and focus on how to collect security sensor - agent information in a secure and trusted way. We then introduce the concept of hardware assisted security sensor information collection that improve the level if trust (by hardware means) and also increase the responsiveness of the sensor. Thus, we propose a Hardware Security Token (HST) that when connected to a CI Host, it acts as a secure anchor for security agent information collection. We describe the HST functionality, its association with a host device, its expected role and its log monitoring mechanism. We also provide information on how security can be established between the Host device and the HST.Then, we introduce and describe the necessary Host components that need to be established in order to guarantee a high security level and correct HST functionality. We, also provide a realization-implementation of the HST overall concept in a FPGA SoC evaluation board and describe how the HST implementation can controlled. Finally, we provide indicative use case scenarios of how the HST can be used in practice to provide a variety of different security services beyond acting as a secure ADS sensor.


Author(s):  
Andrea Tortorelli ◽  
Andrea Fiaschetti ◽  
Alessandro Giuseppi ◽  
Vincenzo Suraci ◽  
Roberto Germanà ◽  
...  

2020 ◽  
Vol 91 (6) ◽  
pp. 7-18
Author(s):  
О. Skydan ◽  
◽  
О. Nykolyuk ◽  
P. Pyvovar ◽  
P. Topolnytskyi ◽  
...  

2016 ◽  
Vol 11 (2) ◽  
pp. 92
Author(s):  
Fatma Zayen Sbiaa ◽  
Medien Zeghid ◽  
Sonia Kotel ◽  
Rached Tourki ◽  
Mohsen Machhout ◽  
...  
Keyword(s):  

Author(s):  
Anatoly Chlenov ◽  
◽  
Tatyana Butcinskaya ◽  
Nikolai Ryabtsev ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document