The ever-increasing adoption at the factory field level of COTS (commercial off-the-shelf) hardware and software to host both real-time control tasks and a general-purpose operating system on the same machine is profoundly influencing the extent of threats that a factory network and computing infrastructure shall be prepared to deal with. In fact, these machines share with their office automation counterparts the same kinds of vulnerabilities and, being often interconnected to computers providing services to the public, are prone to cyber-attacks. In this paper, the architecture and use of a software tool able to analyse a factory network for vulnerabilities are described. Automating the analysis is of outmost importance because, as the complexity of the network grows, the problem rapidly becomes hard to tackle by hand due to the subtle interactions that may occur among apparently unrelated vulnerabilities.

On the Analysis of Vulnerability Chains in Industrial Networks

M Cheminod;A Valenzano
2008

Abstract

The ever-increasing adoption at the factory field level of COTS (commercial off-the-shelf) hardware and software to host both real-time control tasks and a general-purpose operating system on the same machine is profoundly influencing the extent of threats that a factory network and computing infrastructure shall be prepared to deal with. In fact, these machines share with their office automation counterparts the same kinds of vulnerabilities and, being often interconnected to computers providing services to the public, are prone to cyber-attacks. In this paper, the architecture and use of a software tool able to analyse a factory network for vulnerabilities are described. Automating the analysis is of outmost importance because, as the complexity of the network grows, the problem rapidly becomes hard to tackle by hand due to the subtle interactions that may occur among apparently unrelated vulnerabilities.
2008
Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT
Inglese
7th IEEE International Workshop on Factory Communication Systems (WFCS 2008),
215
224
10
978-1-4244-2349-1
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4638740
IEEE-Institute Of Electrical And Electronics Engineers Inc.
Piscataway
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
21-23 Maggio 2008
Dresden
industrial networks
security
automated analysis
vulnerabilities
software tools
4
none
Cheminod, M; Cibrario Bertolotti, I; Durante, L; Valenzano, A
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/67825
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 11
  • ???jsp.display-item.citation.isi??? ND
social impact