Back to Search
Start Over
Detecting Chains of Vulnerabilities in Industrial Networks
- Source :
- IEEE transactions on industrial informatics 5 (2009): 181–193. doi:10.1109/TII.2009.2018627, info:cnr-pdr/source/autori:M. Cheminod; I. Cibrario Bertolotti; L. Durante; P. Maggi; D. Pozza; R. Sisto; A. Valenzano/titolo:Detecting Chains of Vulnerabilities in Industrial Networks/doi:10.1109%2FTII.2009.2018627/rivista:IEEE transactions on industrial informatics/anno:2009/pagina_da:181/pagina_a:193/intervallo_pagine:181–193/volume:5
- Publication Year :
- 2009
- Publisher :
- Institute of Electrical and Electronics Engineers (IEEE), 2009.
-
Abstract
- In modern factories, personal computers are starting to replace traditional programmable logic controllers, due to cost and flexibility reasons, and also because their operating systems now support programming environments even suitable for demanding real-time applications. These characteristics, as well as the ready availability of many software packages covering any kind of needs, have made the introduction of PC-based devices at the factory field level especially attractive. However, this approach has a profound influence on the extent of threats that a factory computing infrastructure shall be prepared to deal with. In fact, industrial personal computers share the same kinds of vulnerabilities with their office automation counterparts. Then, their introduction increases the risk of cyber-attacks. As the complexity of the network grows, the problem rapidly becomes hard to tackle by hand, due to the subtle and unforeseen interactions that may occur among apparently unrelated vulnerabilities, thus bearing the focus on the full automation of the analysis. Going into this direction, this paper presents a software tool that, given an accurate and machine-readable description of vulnerabilities, detects whether or not they are of concern and evaluates consequences in the context of a factory network.
- Subjects :
- Network security
Computer science
Vulnerability
chains of vulnerabilities
Context (language use)
Application software
computer.software_genre
Computer security
Software
computer network security
Automatic analysis tools
industrial communication systems
Electrical and Electronic Engineering
Flexibility (engineering)
business.industry
Automation
Computer Science Applications
Control and Systems Engineering
Embedded system
Office automation
Factory (object-oriented programming)
business
computer
Secure coding
Information Systems
Subjects
Details
- ISSN :
- 19410050 and 15513203
- Volume :
- 5
- Database :
- OpenAIRE
- Journal :
- IEEE Transactions on Industrial Informatics
- Accession number :
- edsair.doi.dedup.....b0648ec61922fe3dafb7904ede5c797a
- Full Text :
- https://doi.org/10.1109/tii.2009.2018627