Application of Attribute Based Access Control Model for Industrial Control Systems
Автор: Erkan Yalcinkaya, Antonio Maffei, Mauro Onori
Журнал: International Journal of Computer Network and Information Security(IJCNIS) @ijcnis
Статья в выпуске: 2 vol.9, 2017 года.
Бесплатный доступ
The number of reported security vulnerabilities and incidents related to the industrial control systems (ICS) has increased recent years. As argued by several researchers, authorization issues and poor access control are key incident vectors. The majority of ICS are not designed security in mind and they usually lack strong and granular access control mechanisms. The attribute based access control (ABAC) model offers high authorization granularity, central administration of access policies with centrally consolidated and monitored logging properties. This research proposes to harness the ABAC model to address the present and future ICS access control challenges. The proposed solution is also implemented and rigorously tested to demonstrate the feasibility and viability of ABAC model for ICS.
Attribute based access control (ABAC), industrial control systems (ICS), fine grained authorization, central policy enforcement
Короткий адрес: https://sciup.org/15011745
IDR: 15011745
Список литературы Application of Attribute Based Access Control Model for Industrial Control Systems
- ICS-CERT, "ICS-CERT Year in Review 2012." 2012.
- ICS-CERT, "ICS-CERT Year in Review 2013." 2013.
- U.S. Department of Homeland Security, "Common Cybersecurity Vulnerabilities in ICS." May-2011.
- ICS-CERT, "ICS-CERT Monitor between September 2014-February 2015." 2015.
- GE Measurement & Control Solutions, "Top 10 Cyber Vulnerabilities for Control Systems." 2012.
- National American Reliability Council, "Top 10 Vulnerabilities of Control Systems and their Mitigations.pdf." Dec-2006.
- M. Bishop, Introduction to computer security. Boston: Addison-Wesley, 2005.
- L. Janczewski and A. M. Colarik, Eds., Cyber warfare and cyber terrorism. Hershey: Information Science Reference, 2008.
- R. S. Sandhu and P. Samarati, "Access control: principle and practice," Commun. Mag. IEEE, vol. 32, no. 9, pp. 40–48, 1994.
- S. Oh and S. Park, "Task–role-based access control model," Inf. Syst., vol. 28, no. 6, pp. 533–562, 2003.
- R. Sandhu, "Access control: The neglected frontier," in Information Security and Privacy, 1996, pp. 219–227.
- V. C. Hu, D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, and K. Scarfone, "Guide to Attribute Based Access Control (ABAC) Definition and Considerations," National Institute of Standards and Technology, NIST SP 800-162, Jan. 2014.
- L. Pietre-Cambacedes, M. Tritschler, and G. N. Ericsson, "Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs," IEEE Trans. Power Deliv., vol. 26, no. 1, pp. 161–172, Jan. 2011.
- A. Valenzano, "Industrial Cybersecurity: Improving Security Through Access Control Policy Models," IEEE Ind. Electron. Mag., vol. 8, no. 2, pp. 6–17, Jun. 2014.
- M. Cheminod, L. Durante, L. Seno, and A. Valenzano, "On the description of access control policies in networked industrial systems" in Factory Communication Systems (WFCS), 2014 10th IEEE Workshop on, 2014, pp. 1–10.
- K. Stouffer, J. Falco, and K. Scarfone, "NIST, Special Publication 800-82, Guide to Industrial Control Systems (ICS) Security." Jun-2011.
- "ISA99, Industrial Automation and Control Systems Security - ISA." [Online]. Available: https://www.isa.org/isa99/. [Accessed: 04-Apr-2015].
- M. Onori and J. Barata, "Evolvable Production Systems: new applications in mechatronic equipment", Transactions on Industrial Electronics, IEEE Journal, IES Society, 2010.
- WSO2 Identity Server 5.0.0. www.wso2.org: WSO2, 2015.
- MySQL Community Server 5.6.24. www.mysql.com: MySQL, 2015.
- SoapUI 5.2. www.soapui.com: SmartBear, 2015.
- U.S. Department of Homeland Security, "Control Systems Communications Encryption Primer" Dec-2009.
- U.S. Department of Energy "Communications Requirements of Smart Grid Technologies" Oct-2010.