Cargando…

Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices

Critical infrastructures and associated real time Informational systems need some security protection mechanisms that will be able to detect and respond to possible attacks. For this reason, Anomaly Detection Systems (ADS), as part of a Security Information and Event Management (SIEM) system, are ne...

Descripción completa

Detalles Bibliográficos
Autores principales: Fournaris, Apostolos P., Dimopoulos, Charis, Lampropoulos, Konstantinos, Koufopavlou, Odysseas
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7308978/
https://www.ncbi.nlm.nih.gov/pubmed/32486125
http://dx.doi.org/10.3390/s20113092
_version_ 1783549117180411904
author Fournaris, Apostolos P.
Dimopoulos, Charis
Lampropoulos, Konstantinos
Koufopavlou, Odysseas
author_facet Fournaris, Apostolos P.
Dimopoulos, Charis
Lampropoulos, Konstantinos
Koufopavlou, Odysseas
author_sort Fournaris, Apostolos P.
collection PubMed
description Critical infrastructures and associated real time Informational systems need some security protection mechanisms that will be able to detect and respond to possible attacks. For this reason, Anomaly Detection Systems (ADS), as part of a Security Information and Event Management (SIEM) system, are needed for constantly monitoring and identifying potential threats inside an Information Technology (IT) system. Typically, ADS collect information from various sources within a CI system using security sensors or agents and correlate that information so as to identify anomaly events. Such sensors though in a CI setting (factories, power plants, remote locations) may be placed in open areas and left unattended, thus becoming targets themselves of security attacks. They can be tampering and malicious manipulated so that they provide false data that may lead an ADS or SIEM system to falsely comprehend the CI current security status. In this paper, we describe existing approaches on security monitoring in critical infrastructures and focus on how to collect security sensor–agent information in a secure and trusted way. We then introduce the concept of hardware assisted security sensor information collection that improves the level of trust (by hardware means) and also increases the responsiveness of the sensor. Thus, we propose a Hardware Security Token (HST) that when connected to a CI host, it acts as a secure anchor for security agent information collection. We describe the HST functionality, its association with a host device, its expected role and its log monitoring mechanism. We also provide information on how security can be established between the host device and the HST. Then, we introduce and describe the necessary host components that need to be established in order to guarantee a high security level and correct HST functionality. We also provide a realization–implementation of the HST overall concept in a FPGA SoC evaluation board and describe how the HST implementation can be controlled. In addition, in the paper, two case studies where the HST has been used in practice and its functionality have been validated (one case study on a real critical infrastructure test site and another where a critical industrial infrastructure was emulated in our lab) are described. Finally, results taken from these two case studies are presented, showing actual measurements for the in-field HST usage.
format Online
Article
Text
id pubmed-7308978
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-73089782020-06-25 Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices Fournaris, Apostolos P. Dimopoulos, Charis Lampropoulos, Konstantinos Koufopavlou, Odysseas Sensors (Basel) Article Critical infrastructures and associated real time Informational systems need some security protection mechanisms that will be able to detect and respond to possible attacks. For this reason, Anomaly Detection Systems (ADS), as part of a Security Information and Event Management (SIEM) system, are needed for constantly monitoring and identifying potential threats inside an Information Technology (IT) system. Typically, ADS collect information from various sources within a CI system using security sensors or agents and correlate that information so as to identify anomaly events. Such sensors though in a CI setting (factories, power plants, remote locations) may be placed in open areas and left unattended, thus becoming targets themselves of security attacks. They can be tampering and malicious manipulated so that they provide false data that may lead an ADS or SIEM system to falsely comprehend the CI current security status. In this paper, we describe existing approaches on security monitoring in critical infrastructures and focus on how to collect security sensor–agent information in a secure and trusted way. We then introduce the concept of hardware assisted security sensor information collection that improves the level of trust (by hardware means) and also increases the responsiveness of the sensor. Thus, we propose a Hardware Security Token (HST) that when connected to a CI host, it acts as a secure anchor for security agent information collection. We describe the HST functionality, its association with a host device, its expected role and its log monitoring mechanism. We also provide information on how security can be established between the host device and the HST. Then, we introduce and describe the necessary host components that need to be established in order to guarantee a high security level and correct HST functionality. We also provide a realization–implementation of the HST overall concept in a FPGA SoC evaluation board and describe how the HST implementation can be controlled. In addition, in the paper, two case studies where the HST has been used in practice and its functionality have been validated (one case study on a real critical infrastructure test site and another where a critical industrial infrastructure was emulated in our lab) are described. Finally, results taken from these two case studies are presented, showing actual measurements for the in-field HST usage. MDPI 2020-05-30 /pmc/articles/PMC7308978/ /pubmed/32486125 http://dx.doi.org/10.3390/s20113092 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Fournaris, Apostolos P.
Dimopoulos, Charis
Lampropoulos, Konstantinos
Koufopavlou, Odysseas
Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices
title Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices
title_full Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices
title_fullStr Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices
title_full_unstemmed Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices
title_short Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices
title_sort anomaly detection trusted hardware sensors for critical infrastructure legacy devices
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7308978/
https://www.ncbi.nlm.nih.gov/pubmed/32486125
http://dx.doi.org/10.3390/s20113092
work_keys_str_mv AT fournarisapostolosp anomalydetectiontrustedhardwaresensorsforcriticalinfrastructurelegacydevices
AT dimopouloscharis anomalydetectiontrustedhardwaresensorsforcriticalinfrastructurelegacydevices
AT lampropouloskonstantinos anomalydetectiontrustedhardwaresensorsforcriticalinfrastructurelegacydevices
AT koufopavlouodysseas anomalydetectiontrustedhardwaresensorsforcriticalinfrastructurelegacydevices