• DocumentCode
    2883704
  • Title

    Stuxnet worm impact on industrial cyber-physical system security

  • Author

    Karnouskos, Stamatis

  • Author_Institution
    SAP Res., Karlsruhe, Germany
  • fYear
    2011
  • fDate
    7-10 Nov. 2011
  • Firstpage
    4490
  • Lastpage
    4494
  • Abstract
    Industrial systems consider only partially security, mostly relying on the basis of “isolated” networks, and controlled access environments. Monitoring and control systems such as SCADA/DCS are responsible for managing critical infrastructures operate in these environments, where a false sense of security assumptions is usually made. The Stuxnet worm attack demonstrated widely in mid 2010 that many of the security assumptions made about the operating environment, technological capabilities and potential threat risk analysis are far away from the reality and challenges modern industrial systems face. We investigate in this work the highly sophisticated aspects of Stuxnet, the impact that it may have on existing security considerations and pose some thoughts on the next generation SCADA/DCS systems from a security perspective.
  • Keywords
    SCADA systems; critical infrastructures; invasive software; SCADA-DCS systems; Stuxnet worm impact; controlled access environments; critical infrastructure management; industrial cyber-physical system security; isolated networks; threat risk analysis; Grippers; Hardware; Internet; Monitoring; Process control; Security; Software;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    IECON 2011 - 37th Annual Conference on IEEE Industrial Electronics Society
  • Conference_Location
    Melbourne, VIC
  • ISSN
    1553-572X
  • Print_ISBN
    978-1-61284-969-0
  • Type

    conf

  • DOI
    10.1109/IECON.2011.6120048
  • Filename
    6120048