Title :
On the analysis of vulnerability chains in industrial networks
Author :
Cheminod, Manuel ; Bertolotti, Ivan Cibrario ; Durante, Luca ; Valenzano, Adriano
Author_Institution :
IEIIT-CNR, Torino
Abstract :
The ever-increasing adoption at the factory field level of COTS (commercial off-the-shelf) hardware and software to host both real-time control tasks and a general-purpose operating system on the same machine is profoundly influencing the extent of threats that a factory network and computing infrastructure shall be prepared to deal with. In fact, these machines share with their office automation counterparts the same kinds of vulnerabilities and, being often interconnected to computers providing services to the public, are prone to cyber-attacks. In this paper, the architecture and use of a software tool able to analyse a factory network for vulnerabilities are described. Automating the analysis is of outmost importance because, as the complexity of the network grows, the problem rapidly becomes hard to tackle by hand due to the subtle interactions that may occur among apparently unrelated vulnerabilities.
Keywords :
factory automation; software packages; software tools; COTS; commercial off-the-shelf hardware; commercial off-the-shelf software; cyber-attacks; factory network; industrial networks; software tool; vulnerability chains; Automatic control; Computer architecture; Computer networks; Control systems; Electrical equipment industry; Hardware; Office automation; Operating systems; Production facilities; Real time systems;
Conference_Titel :
Factory Communication Systems, 2008. WFCS 2008. IEEE International Workshop on
Conference_Location :
Dresden
Print_ISBN :
978-1-4244-2349-1
Electronic_ISBN :
978-1-4244-2350-7
DOI :
10.1109/WFCS.2008.4638740