Auflistung nach Schlagwort "ICS"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- TextdokumentAutomated Monitoring of Operational Technology Security and Compliance for Power Grids(GI SICHERHEIT 2022, 2022) Fraune, BastianIT security standards can increase trust in a system or component if compliance to the standard can be proven to third parties. Those standards usually specify requirements for security features, which then lead to a certain configuration of an industrial control system. Continuous monitoring of IT security configurations on intelligent electronic devices is difficult because there is no standardised way to query the security configurations of those devices. The objective of this PhD project is to enable automatic querying of security settings from industrial control system in the use case of the power grid infrastructure for remote monitoring. This opens up the possibility of automatically comparing the actual security state on the device against the defined IT security standard configurations. In such cases, industrial control systems that do not comply with defined security standards can thus be identified directly by monitoring systems in the control centre.
- KonferenzbeitragUnderstanding stegomalware in ICS: Attacks and Prevention(INFORMATIK 2024, 2024) Edeh, Natasha; Yatagha, Romarick; Mejri, Oumayma; Waedt, KarlThis research investigates the growing threat of stego-malware in Industrial Control Systems (ICS), where attackers utilize steganography to embed malicious code covertly. Such attacks pose significant challenges due to their ability to evade traditional detection methods. The study reviews current cybersecurity frameworks and detection techniques, highlighting their strengths and limitations against stego-malware. It explores various detection approaches, including signature-based, anomaly-based, and AI/ML-based methods, assessing their effectiveness within the context of ISO/IEC 27001 and IEC 62443 standards. Case studies such as Havex and Industroyer underscore the real-world impact of stego-malware on ICS infrastructure. The research advocates for enhanced integration of AI and machine learning to bolster steganalysis capabilities, and proposes improvements to existing cybersecurity frameworks to address steganographic threats more effectively. By bridging gaps in current knowledge, this study contributes to advancing cybersecurity measures tailored to protect critical ICS environments against evolving cyber threats.