Integrating Integrity Reporting into Industrial Control Systems - A Reality Check

Tobias Rauter, Johannes Iber, Christian Josef Kreiner

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Abstract

Due to the need of increased cooperation and connectivity, security is getting a vital property of industrial control systems. Besides system hardening, the detection of security breaches in different subsystems has been becoming a research-focus recently. This chapter summarizes the work concerning anomaly detection at different system levels. The, a system that maintains availability and integrity of distributed control systems through automated reconfiguration in case of integrity violations is proposed. We aim to detect such integrity violations through integrity reporting. This is a well-known technology, albeit not widely used in real system because of scalability problems. In this chapter, three different remote attestation methods (binary, privilege and signature-based) are integrated into a remote terminal unit to analyze and discuss the benefits and drawbacks of each method. Depending on the actual RTU architecture and already in-place development and deployment processes, the integration of remote attestation may be feasible for industrial control systems.
Original languageEnglish
Title of host publicationSolutions for Cyber-Physical Systems Ubiquity
EditorsNorbert Druml, Andreas Genser, Armin Krieg, Manuel Menghin, Andrea Höller
PublisherIGI Global Publishing
Pages358
Number of pages25
ISBN (Electronic)9781522528463
ISBN (Print)9781522528456, 1522528458
Publication statusPublished - Jul 2017

Fingerprint

Control systems
Distributed parameter control systems
Hardening
Scalability
Availability

Cite this

Rauter, T., Iber, J., & Kreiner, C. J. (2017). Integrating Integrity Reporting into Industrial Control Systems - A Reality Check. In N. Druml, A. Genser, A. Krieg, M. Menghin, & A. Höller (Eds.), Solutions for Cyber-Physical Systems Ubiquity (pp. 358). [Chapter 14] IGI Global Publishing.

Integrating Integrity Reporting into Industrial Control Systems - A Reality Check. / Rauter, Tobias; Iber, Johannes; Kreiner, Christian Josef.

Solutions for Cyber-Physical Systems Ubiquity. ed. / Norbert Druml; Andreas Genser; Armin Krieg; Manuel Menghin; Andrea Höller. IGI Global Publishing, 2017. p. 358 Chapter 14.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Rauter, T, Iber, J & Kreiner, CJ 2017, Integrating Integrity Reporting into Industrial Control Systems - A Reality Check. in N Druml, A Genser, A Krieg, M Menghin & A Höller (eds), Solutions for Cyber-Physical Systems Ubiquity., Chapter 14, IGI Global Publishing, pp. 358.
Rauter T, Iber J, Kreiner CJ. Integrating Integrity Reporting into Industrial Control Systems - A Reality Check. In Druml N, Genser A, Krieg A, Menghin M, Höller A, editors, Solutions for Cyber-Physical Systems Ubiquity. IGI Global Publishing. 2017. p. 358. Chapter 14
Rauter, Tobias ; Iber, Johannes ; Kreiner, Christian Josef. / Integrating Integrity Reporting into Industrial Control Systems - A Reality Check. Solutions for Cyber-Physical Systems Ubiquity. editor / Norbert Druml ; Andreas Genser ; Armin Krieg ; Manuel Menghin ; Andrea Höller. IGI Global Publishing, 2017. pp. 358
@inbook{1867e81ee3c74314a2eb46121ff3bfc1,
title = "Integrating Integrity Reporting into Industrial Control Systems - A Reality Check",
abstract = "Due to the need of increased cooperation and connectivity, security is getting a vital property of industrial control systems. Besides system hardening, the detection of security breaches in different subsystems has been becoming a research-focus recently. This chapter summarizes the work concerning anomaly detection at different system levels. The, a system that maintains availability and integrity of distributed control systems through automated reconfiguration in case of integrity violations is proposed. We aim to detect such integrity violations through integrity reporting. This is a well-known technology, albeit not widely used in real system because of scalability problems. In this chapter, three different remote attestation methods (binary, privilege and signature-based) are integrated into a remote terminal unit to analyze and discuss the benefits and drawbacks of each method. Depending on the actual RTU architecture and already in-place development and deployment processes, the integration of remote attestation may be feasible for industrial control systems.",
author = "Tobias Rauter and Johannes Iber and Kreiner, {Christian Josef}",
year = "2017",
month = "7",
language = "English",
isbn = "9781522528456",
pages = "358",
editor = "Norbert Druml and Andreas Genser and Armin Krieg and Manuel Menghin and Andrea H{\"o}ller",
booktitle = "Solutions for Cyber-Physical Systems Ubiquity",
publisher = "IGI Global Publishing",
address = "United States",

}

TY - CHAP

T1 - Integrating Integrity Reporting into Industrial Control Systems - A Reality Check

AU - Rauter, Tobias

AU - Iber, Johannes

AU - Kreiner, Christian Josef

PY - 2017/7

Y1 - 2017/7

N2 - Due to the need of increased cooperation and connectivity, security is getting a vital property of industrial control systems. Besides system hardening, the detection of security breaches in different subsystems has been becoming a research-focus recently. This chapter summarizes the work concerning anomaly detection at different system levels. The, a system that maintains availability and integrity of distributed control systems through automated reconfiguration in case of integrity violations is proposed. We aim to detect such integrity violations through integrity reporting. This is a well-known technology, albeit not widely used in real system because of scalability problems. In this chapter, three different remote attestation methods (binary, privilege and signature-based) are integrated into a remote terminal unit to analyze and discuss the benefits and drawbacks of each method. Depending on the actual RTU architecture and already in-place development and deployment processes, the integration of remote attestation may be feasible for industrial control systems.

AB - Due to the need of increased cooperation and connectivity, security is getting a vital property of industrial control systems. Besides system hardening, the detection of security breaches in different subsystems has been becoming a research-focus recently. This chapter summarizes the work concerning anomaly detection at different system levels. The, a system that maintains availability and integrity of distributed control systems through automated reconfiguration in case of integrity violations is proposed. We aim to detect such integrity violations through integrity reporting. This is a well-known technology, albeit not widely used in real system because of scalability problems. In this chapter, three different remote attestation methods (binary, privilege and signature-based) are integrated into a remote terminal unit to analyze and discuss the benefits and drawbacks of each method. Depending on the actual RTU architecture and already in-place development and deployment processes, the integration of remote attestation may be feasible for industrial control systems.

M3 - Chapter

SN - 9781522528456

SN - 1522528458

SP - 358

BT - Solutions for Cyber-Physical Systems Ubiquity

A2 - Druml, Norbert

A2 - Genser, Andreas

A2 - Krieg, Armin

A2 - Menghin, Manuel

A2 - Höller, Andrea

PB - IGI Global Publishing

ER -