Auflistung nach Autor:in "Belaidi,Siwar"
1 - 3 von 3
Treffer pro Seite
Sortieroptionen
- TextdokumentInteractive graphical modeling of security artefacts for abstracted Industry 4.0 automation systems(INFORMATIK 2022, 2022) Tchuegoue Djeukoua,Louis Roger; Kreho,Edin; Belaidi,Siwar; Waedt,KarlThe frontend and backend are found in all software and therefore also on all websites. These two terms describe two different layers that make up programs or pages. About two thirds of all companies have their own website, and most employees use computers.Globally, cyberattacks are becoming more prominent and spreading to multiple areas, and the move to Industry 4.0 requires increased security measures. Important security precautions must be taken from the development of industrial devices that use the Industrial Internet of Things, with IEC 62443, ISO/IEC 27001, and their integration into the architecture of existing information and automation systems must be secure. IEC 62443 focuses on the IT security of so-called industrial automation and control systems (IACS), which are necessary for the safe and reliable operation of automated factories or infrastructures. ] Since security breaches are inevitable, it is also important to implement detection and response mechanisms in industrial automation and control systems (IACS). Together, these measures will enable various organizations to achieve an appropriate level of resilience. This paper discusses the interactive graphical representation of large-scale industrial automation systems for the purpose of modeling and evaluating cybersecurity during all phases of the industrial equipment life cycle. In addition, it addresses the expressiveness and scalability of front-end graphical problems by assuming that a multi-user back-end server with a semi-formal representation of cybersecurity-related artifacts is available, at least in software prototype form.
- TextdokumentModel-based Integrity Monitoring of Industrial Automation And Control Systems(INFORMATIK 2022, 2022) Peters,Ludger; Khalaf,Mahmoud; Waedt,Karl; Schindler,Josef; Belaidi,SiwarThis paper aims to enhance cyber security within Electrical Power Systems (EPS) of power plants by extending and using an updated plant simulator. In this paper, we assume a sophisticated attacker, as part of an Advanced Persistent Threat (APT), who gradually damages or manipulates primary assets (in the sense of ISO/IEC 27005:2018, e. g. main cooling water pumps, feedwater pumps, safety valves, and circuit breakers). Accordingly, we assume that the attack agent performs gradual manipulations at the application level. Detecting and predicting a potential anomaly is designed and implemented based on machine learning of expected behavior. The paper will include examples of attacks executed over an extended time period by gradually manipulating combinations of analog and binary signal values or set-points. Challenges related to the training of the detection algorithms, avoidance of false positives, and concise reporting to non-security domain experts will also be addressed.
- TextdokumentSecuring javascript runtime of OPC UA deployments(INFORMATIK 2022, 2022) Schindler,Josef; Belaidi,Siwar; Kirdan,Erkin; Waedt,KarlOPC UA is a commonly used machine-to-machine communication protocol. As it is used in industrial critical infrastructure, its security is vital. OPC UA has several proprietary and open-source implementations in different programming languages. Among them, a JavaScript implementation node-opcua stands out due to advantages such as ease of use, code maturity etc. JavaScript is a just-in-time compiled programming language that is executed by a runtime system. Node.js is the most common runtime environment to run JavaScript programs. Deno is it a potential and unofficial successor as it is developed by the original author of Node.js. One promised improvement of Deno is the focus on higher security, such as having a restricted file system and network access by default. Since (1) not all libraries have been adopted yet for for Deno, since (2) this new runtime comes with a compatibility mode featured first in version v1.15, since (3) there is very few research literature yet and since (4) there is no current dedicated OPC UA implementation for Deno so far, we present and evaluate measures to overcome errors when running node-opcua on Deno in this paper.