Logo des Repositoriums
 

Security challenges and best practices for resilient IIoT Networks: Network Segmentation

dc.contributor.authorYatagha, Romarick
dc.contributor.authorWaedt, Karl
dc.contributor.authorSchindler, Josef
dc.contributor.authorKirdan, Erkan
dc.contributor.editorKlein, Maike
dc.contributor.editorKrupka, Daniel
dc.contributor.editorWinter, Cornelia
dc.contributor.editorWohlgemuth, Volker
dc.date.accessioned2023-11-29T14:50:26Z
dc.date.available2023-11-29T14:50:26Z
dc.date.issued2023
dc.description.abstractThe surging prominence of the Industrial Internet of Things (IIoT) introduces both unique prospects and complex issues for industrial control systems, notably within the cybersecurity sphere. Cybersecurity concerns are particularly acute for smart factories, entities that leverage IIoT capabilities like networked sensors and machine learning to streamline production. The heterogeneous devices from diverse manufacturers and vast interconnected networks heighten their susceptibility to cyber threats. This paper examines the contemporary cybersecurity landscape within smart factories, pinpointing current vulnerabilities and imminent threats. Drawing on this analysis, we put forth a suite of best practices and strategic measures to fortify IIoT networks, including but not limited to network segmentation and stringent access controls. We pay specific attention to network segmentation, a technique used to break down a computer network into manageable subnetworks, thus mitigating the risk of attacks. We propose an innovative network segmentation policy that leverages clustering, an unsupervised learning algorithm. This algorithm classifies network traffic into distinct categories based on, but not limited to, source and destination IP addresses, employed protocol, and packet size. This data-driven classification simplifies network segmentation and configuration, minimizing their complexity. The paper also underlines the critical role of employee training and awareness in establishing robust security practices, particularly for the design, integration, and deployment of IIoT devices and edge computing. Our findings offer actionable insights for industrial control systems operators and cybersecurity professionals, empowering them to fortify their IIoT networks against cyber threats effectively.en
dc.identifier.doi10.18420/inf2023_204
dc.identifier.isbn978-3-88579-731-9
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/43135
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofINFORMATIK 2023 - Designing Futures: Zukünfte gestalten
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-337
dc.subjectNetwork Segmentation
dc.subjectMachine Learning
dc.subjectCybersecurity
dc.subjectIIoT
dc.subjectEdge Computing
dc.titleSecurity challenges and best practices for resilient IIoT Networks: Network Segmentationen
dc.typeText/Conference Paper
gi.citation.endPage2070
gi.citation.publisherPlaceBonn
gi.citation.startPage2051
gi.conference.date26.-29. September 2023
gi.conference.locationBerlin
gi.conference.sessiontitleWirtschaft, Management Industrie - 8th Industrial Automation and Control Systems Standardization Workshop (IACS 2023)

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
09_06_06_Yatagha.pdf
Größe:
1.95 MB
Format:
Adobe Portable Document Format