Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2808783.2808795acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
panel

Cyber Threats to Industrial Control Systems

Published: 16 October 2015 Publication History

Abstract

Cyber attacks have been a crucial problem on the Internet for more than a couple of decades. As information and communication technologies have been applied to the field systems in the traditional industries, they also have become connected and more vulnerable to the existing cyber attack techniques. To make matters worse, a practical malicious software suite was exposed from Italian hacking team by another leakage incident, which is noted by somebody as an insider's rip. Now, we worry about social problems caused by copycats. Nevertheless, more concerns have been arisen among experts about that this tendency is getting more serious when IoT (Internet of Things) environment has been realized. In an IoT environment, every device will be massively connected to each other. We can classify the IoT devices roughly into two categories, which are leaf devices and gateways. In this environment, anonymous devices may usually participate as a authorized consumer or producer for a service in the same domain with a gateway. The gateway may take a role for some devices as a delegate for specific services. Insider's exposure problem will be more serious concern in this situation. At a user's point of view, smart-phones for wearable devices, the AVN (Audio Visual Navigation) on smart cars and HMI host for ICS (Industrial Control Systems) are considered as gateways for IoT environments. In this situation, a canonical form of large scale IoT devices should be smart cars. The smart cars are going to include more software-incorporated electric components for intelligent safety functions adopted at the vacancy of the combustion engine and are also becoming connected and remotely controllable. This means these mobile devices cannot be free from the cyber security threats, which is solicited by insider devices [Stephen:CEA]. For a recent example, commercial networked vehicles were remotely hacked and controlled without any wired connections. In this panel, we will discuss current hot issues related to the malicious software in various aspects. In the existing mobile network and the connected smart devices, Android-based mobile malware is a big trouble. Combined malware is another problem among the emerging all-connected ICS equipment. Detecting these malicious behavior is one of the new IT challenges. We will share perspective ideas related to these topics among panelists and audiences through a professional discussion.

References

[1]
Secure Authentication for Mobile Internet Services. Critical Considerations V1.1, Sim alliance White Paper, 2011.
[2]
Unintentional Insider Threats: A Foundational Study. The CERT R Insider Threat Team, TECHNICAL NOTE, CMU/SEI-2013-TN-022, Carnegie Mellon University, 2013.
[3]
S. Checkoway, D. McCoy, B. Kantor, and et al. Comprehensive experimental analyses of automotive attack surfaces. In SEC'11 Proceedings of the 20th USENIX conference on Security.
[4]
A. Colella, A. Castiglione, and C. Colombini. Industrial control system cyber threats indicators in smart grid technology. In Proc. of the 17th International Conference on Network-Based Information Systems (NBiS), pages 374--380, Sept. 10-12 2014.
[5]
A. Colella, A. Castiglione, and A. Santis. The role of trust and co-partnership in the societal digital security culture approach. In Proc. of the 2014 International Conference on Intelligent Networking and Collaborative Systems (INCoS), pages 350--355, Sept. 10-12 2014.
[6]
C. Farivar. Hacking Team goes to war against former employees, suspects some helped hackers. http://arstechnica.com/security/2015/07/italian-prosecutors-investigate-former-hacking-team-employees-for-role-in-hack/, Jul 21 2015.
[7]
M. Guerar, M. Migliardi, A. Merlo, M. Benmohammed, and B. Messabih. A completely automatic public physical test to tell computers and humans apart: a way to enhance authentication schemes in mobile devices. In Proc. of the 10th International Conference on High Performance Computing Systems (HPCS 2015). Amsterdam, The Netherlands, July 20-24 2015.
[8]
R. Langner. Stuxnet: Dissecting a cyberwarfare weapon. Journal of IEEE Security and Privacy, 09(03):49--51, May 2011.
[9]
S. Seo, A. Gupta, A. M. Sallam, E. Bertino, and K. Yim. Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer Applications, 38:43--53, February 2014.
[10]
A. Shabtai, L. Tenenboim, and et al. Mobile malware detection through analysis of deviations in application network behavior. Computers & Security, 43(2):1--18, June 2014.

Cited By

View all
  • (2016)Modbus Communication Behavior Modeling and SVM Intrusion Detection MethodProceedings of the 6th International Conference on Communication and Network Security10.1145/3017971.3017978(80-85)Online publication date: 26-Nov-2016
  • (2016)Exploiting Bro for Intrusion Detection in a SCADA SystemProceedings of the 2nd ACM International Workshop on Cyber-Physical System Security10.1145/2899015.2899028(44-51)Online publication date: 30-May-2016
  • (2016)ICS security testbed with delay attack case studyMILCOM 2016 - 2016 IEEE Military Communications Conference10.1109/MILCOM.2016.7795340(283-288)Online publication date: Nov-2016

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MIST '15: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats
October 2015
90 pages
ISBN:9781450338240
DOI:10.1145/2808783
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 October 2015

Check for updates

Author Tags

  1. cyber-physical systems
  2. industrial control systems
  3. internet of things
  4. malware
  5. vulnerability

Qualifiers

  • Panel

Conference

CCS'15
Sponsor:

Acceptance Rates

MIST '15 Paper Acceptance Rate 6 of 14 submissions, 43%;
Overall Acceptance Rate 21 of 54 submissions, 39%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Modbus Communication Behavior Modeling and SVM Intrusion Detection MethodProceedings of the 6th International Conference on Communication and Network Security10.1145/3017971.3017978(80-85)Online publication date: 26-Nov-2016
  • (2016)Exploiting Bro for Intrusion Detection in a SCADA SystemProceedings of the 2nd ACM International Workshop on Cyber-Physical System Security10.1145/2899015.2899028(44-51)Online publication date: 30-May-2016
  • (2016)ICS security testbed with delay attack case studyMILCOM 2016 - 2016 IEEE Military Communications Conference10.1109/MILCOM.2016.7795340(283-288)Online publication date: Nov-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media