skip to main content
10.1145/3321705.3331007acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
poster

Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management

Authors Info & Claims
Published:02 July 2019Publication History

ABSTRACT

We develop a method for collecting security logs of industrial control systems (ICS) as a preliminary study for ICS security log management and integrated monitoring systems. Although there is scope to collect security logs by using traditional IT technology, this is challenging for special ICS devices such as a programmable logic controller (PLC). PLCs are the major target of APT in ICS because physical damage can be caused by connecting directly with sensors or actuators. According to NIST SP 800-92 \citekent2006sp, that provides importance of log management in computer security, security logs generated from PLCs also need to be managed to enhance ICS security. Therefore, this study analyzes how to collect various information on PLCs. Additionally, we experimented with collecting system logs from a PLC that provides system information via a web interface, and the results are described.

References

  1. Seungoh Choi, Yesol Kim, Jeong-Han Yun, Byung-Gil Min, and HyoungChun Kim.2019. Data-Driven Field Mapping of Heterogeneous Security Events for Integrated Monitoring. In Thirteenth Annual IFIP WG 11.10 International conference on Critical Infrastructure Protection.Google ScholarGoogle Scholar
  2. Seungoh Choi, Woomyo Lee, Hyeok-Ki Shin, Jeong-Han Yun, and Sin-Kyu Kim.2018. POSTER: CPS Security Testbed Development Using Controller-in-the-Middle. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS '18). ACM, New York, NY, USA, 829--831. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Nicolas Falliere, Liam O Murchu, and Eric Chien. 2011. W32. stuxnet dossier.White paper, Symantec Corp., Security Response5, 6 (2011), 29.Google ScholarGoogle Scholar
  4. Karen Kent and Murugiah P Souppaya. 2006. SP 800--92: guide to computer securitylog management. (2006).Google ScholarGoogle Scholar
  5. Siemens. 2015. Which information is entered in the diagnostic buffer of the SIMATIC S7 CPU with STEP 7. Retrieved April 15, 2019 from https://support.industry.siemens.com/cs/document/14960968/Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
    July 2019
    708 pages
    ISBN:9781450367523
    DOI:10.1145/3321705

    Copyright © 2019 Owner/Author

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 2 July 2019

    Check for updates

    Qualifiers

    • poster

    Acceptance Rates

    Overall Acceptance Rate418of2,322submissions,18%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader