Cyber Security of Industrial Control Systems in the Future Internet Environment - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

15
(FIVE YEARS 15)

H-INDEX

1
(FIVE YEARS 1)

Published By IGI Global

9781799829102, 9781799829126

Author(s):  
Luis Rosa ◽  
Miguel Borges de Freitas ◽  
João Henriques ◽  
Pedro Quitério ◽  
Filipe Caldeira ◽  
...  

In recent years, IACS (Industrial Automation and Control Systems) have become more complex, due to the increasing number of interconnected devices. This IoT (internet of things)-centric IACS paradigm, which is at the core of the Industry 4.0 concept, expands the infrastructure boundaries beyond the aggregated-plant, mono-operator vision, being dispersed over a large geographic area. From a cybersecurity-centric perspective, the distributed nature of modern IACS makes it difficult not only to understand the nature of incidents but also to assess their progression and threat profile. Defending against those threats is becoming increasingly difficult, requiring orchestrated and collaborative distributed detection, evaluation, and reaction capabilities beyond the scope of a single entity. This chapter presents the Intrusion and Anomaly Detection System platform architecture that was designed and developed within the scope of the ATENA H2020 project, to address the specific needs of distributed IACS while providing (near) real-time cybersecurity awareness.


Author(s):  
Bruno J. Santos ◽  
Rachel P. Tabacow ◽  
Marcelo Barboza ◽  
Tarcisio F. Leão ◽  
Eduardo G. P. Bock

Cyber security in Healthcare is a growing concern. Since it has been a proliferation of IoT devices, data breaches from the healthcare industry are increasing the concern about how cyber security can protect data from connected medical devices. Recent years have seen numerous hacking and IT security incidents. Many healthcare organizations are facing problems to defend their networks from cybercriminals. In the current digital era, the physical world has a cyber-representation. Both the real and virtual worlds are connected in areas, such as informatics and manufacturing. Health 4.0 (H4.0) refers to a group of initiatives aiming to improve medical care for patients, hospitals, researchers, and medical device suppliers. Increasing collaboration in terms of medical equipment, artificial organs, and biosensors is a way to facilitate H4.0. As a result, cyber security budgets have increased, new technology has been purchased, and healthcare organizations are improving at blocking attacks and keeping their networks secure.


Author(s):  
Radoslav M. Raković

The concept of “Cloud computing” became very interesting in recent years because it enables optimization of resources used and costs paid for it. Considering all advantages, this approach is applied widely in business systems of general purpose. In recent years, in literature it is possible to find considerations related to application of this approach in corporate systems as electric power utilities. Having in mind that such types of systems represent infrastructure ones that have great impact to the security of people and utilities, a very important question related to information security should be seriously considered. This chapter discusses advantages and disadvantages of application of cloud computing in electric power utility systems.


Author(s):  
John Hale ◽  
Abraham Habib ◽  
Rujit Raval ◽  
Ryan Irvin ◽  
Peter J. Hawrylak

Cyber-Physical Systems (CPSs) are systems which integrate computational, networking, and physical components within a single functional environment. They play an important role in critical infrastructure, government, and everyday life. CPSs encumber many requirements, such as robustness, safety and security, Quality of Service (QoS), and trust. In addition, CPSs combine a variety of digital and analog technologies. Consequently, their analysis, verification, and control can be challenging. The science of protecting CPSs from blended attacks, those combining cyber and physical attack vectors, is yet to be developed. A much-needed tool on this front is a suitable test environment in which to pursue lines of experimentation and exploration. This chapter describes a testbed that allows researchers to experiment on blended attack and defense scenarios in CPSs through gamification. The testbed features many different systems, both cyber and physical, that are fully instrumented for data analysis and assessment.


Author(s):  
Gustavo Arroyo-Figueroa ◽  
Isai Rojas-Gonzalez ◽  
José Alberto Hernández-Aguilar

Internet of energy (IoE) is the natural evolution of Smart Grid incorporating the paradigm of internet of things (IoT). This complicated environment has a lot of threats and vulnerabilities, so the security challenges are very complex and specialized. This chapter contains a compilation of the main threats, vulnerabilities, and attacks that can occur in the IoE environment and the critical structure of the electrical grid. The objective is to show the best cybersecurity practices that can support maintaining a safe, reliable, and available electrical network complying with the requirements of availability, integrity, and confidentially of the information. The study includes review of countermeasures, standards, and specialized intrusion detection systems, as mechanisms to solve security problems in IoE. Better understanding of security challenges and solutions in the IoE can be the light on future research work for IoE security.


Author(s):  
Ana Gavrovska ◽  
Andreja Samčović

Artificial intelligence is making significant changes in industrial internet of things (IIoT). Particularly, machine and deep learning architectures are now used for cybersecurity in smart factories, smart homes, and smart cities. Using advanced mathematical models and algorithms more intelligent protection strategies should be developed. Hacking of IP surveillance camera systems and Closed-Circuit TV (CCTV) vulnerabilities represent typical example where cyber attacks can make severe damage to physical and other Industrial Control Systems (ICS). This chapter analyzes the possibilities to provide better protection of video surveillance systems and communication networks. The authors review solutions related to migrating machine learning based inference towards edge and smart client devices, as well as methods for DDoS (Distributed Denial of Service) intelligent detection, where DDoS attack is recognized as one of the primary concerns in cybersecurity.


Author(s):  
Branka Mikavica ◽  
Aleksandra Kostić-Ljubisavljević

Future internet environment is affected by permanent and rapid changes, triggered by the emergence of high bandwidth-demanding services, applications, and contents. Cloud computing might be considered as the prelude of the future internet. Additionally, the concept of elastic optical networks is a widely accepted promising solution for the future internet. This chapter addresses the security aspects of the content provisioning process with cloud migration over elastic optical networks in the future internet environment. Key characteristics of the cloud computing and elastic optical networks relevant to the content provisioning process are presented. Major threats in each segment of the observed process, including vulnerabilities in the cloud computing and security issues in elastic optical networks, are considered.


Author(s):  
Valentina V. Timčenko

Introduction of the Dynamic Line Rating (DLR) concept has an important role in implementing smart grids in the power utility's transmission network. DLR assumes real-time control of the overhead transmission line, based on the continuous evaluation of the actual thermal and other operating conditions, and further estimation of the maximum transmission line's load and other relevant parameters that determine operational limitations. This chapter presents cloud-based DLR systems in terms of architecture, cloud services, and cyber security issues. DLR systems are explored with regards to cloud computing in industry, applicable cloud services and infrastructures, and communication system's performance. Security and privacy of cloud-based DLR systems have been addressed in terms of public and private services. A secure hybrid cloud-based architecture to support DLR is proposed.


Author(s):  
Slavica V. Boštjančič Rakas

This chapter presents the development of the Energy Internet throughout the history as an evolutionary solution based on modern technological development and needs, with the respect of its architecture, key features, and key concepts, such as energy router, prosumer, and virtual power plant. The architecture of modern IT support for the electric power sector is considered, including its basic characteristics, the integration of contemporary information and communication technologies, such as cloud and fog computing, as well as the security and quality of service issues that arise with the application of these technologies. This chapter provides an overview of recent research related to the concept of Energy Internet and identifies gaps and directions for further research.


Author(s):  
Rohit Negi ◽  
Anand Handa ◽  
Sandeep Kumar Shukla

Power Grid, Water/Sewage control system, and Industrial automation are some examples of critical infrastructures. They are critical because malfunctioning of any of these may lead to severe industrial accidents. It may also have severe implications for the national economy and security. Nation-states are gearing up for potential cyber warfare, signs of which are already visible in various incidents such as Stuxnet, BlackEnergy, and many other recent attacks. As a result, research in cyber defense for such critical systems is an urgent need for all countries. IIT Kanpur has established the National Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures (C3i Center) to engage in research in this crucial area. In the past, the authors carried out a lot of cybersecurity experiments on co-Simulator-based platforms. These experiments show that they do not allow us to penetrate at the granularity required to defend real systems and therefore, physical test-beds are to be constructed. In this chapter, the authors describe how to build various test-beds.


Sign in / Sign up

Export Citation Format

Share Document