SRI Logo
About Us|R and D Divisions|Careers|Newsroom|Contact Us|SRI Home
     
  SRI Logo

Host Protection Strategies for Industrial Control Systems
 by Dr. Ulf Lindqvist, Zachary Tudor, Annie McIntyre & Brian Peterson.
In Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST), Nov. 13-15, 2012, Boston, MA, pp. 87-92.
Abstract
Protection of ICS process control data, networks, applications, and host operating systems, particularly in multi-vendor environments, is a critical, on-going requirement for the oil and gas sector. A loss of control over a critical control process potentially could result in loss of life, personnel injury, environmental impact, facility damage, production loss, and economic cost. System maintenance and protection increasingly centers on patching vulnerable automation software and operating systems, many of which have reached end-of-life, are unsupported by the vendor, or lack economic basis for replacement. A new alternative to the classic patching approach to maintaining system security, application whitelisting (AWL) technology, was evaluated against a set of established criteria that support continuity of operations in critical system environments by providing strong cybersecurity. This report presents findings of the LOGIIC program regarding application whitelisting, key attributes to its use in an ICS environment, and general conclusions about its implementation.
BibTEX Entry
@INPROCEEDINGS{6459830,
author={McIntyre, Annie and Lindqvist, Ulf and Peterson, Brian and Tudor, Zachary},
booktitle={Homeland Security (HST), 2012 IEEE Conference on Technologies for}, title={Host protection strategies for industrial control systems},
year={Nov.},
pages={87-92},
doi={10.1109/THS.2012.6459830},}
Available at IEEE Xplore
 













 

About Us  |  R&D Divisions  |  Careers  |  Newsroom  |  Contact Us
© 2024 SRI International 333 Ravenswood Avenue, Menlo Park, CA 94025-3493
SRI International is an independent, nonprofit corporation. Privacy policy