SCADA系统
脆弱性(计算)
计算机安全
工业控制系统
计算机科学
漏洞管理
安全控制
软件
脆弱性评估
组分(热力学)
优势和劣势
自动化
软件工程
建筑模式
软件安全保证
控制(管理)
软件系统
工程类
信息安全
保安服务
操作系统
软件建设
哲学
心理弹性
人工智能
物理
电气工程
认识论
热力学
心理治疗师
机械工程
心理学
作者
Danielle Gonzalez,Fawaz Alhenaki,Mehdi Mirakhorli
标识
DOI:10.1109/icsa.2019.00012
摘要
Industrial control systems (ICS) are systems used in critical infrastructures for supervisory control, data acquisition, and industrial automation. ICS systems have complex, component-based architectures with many different hardware, software, and human factors interacting in real time. Despite the importance of security concerns in industrial control systems, there has not been a comprehensive study that examined common security architectural weaknesses in this domain. Therefore, this paper presents the first in-depth analysis of 988 vulnerability advisory reports for Industrial Control Systems developed by 277 vendors. We performed a detailed analysis of the vulnerability reports to measure which components of ICS have been affected the most by known vulnerabilities, which security tactics were affected most often in ICS and what are the common architectural security weaknesses in these systems. Our key findings were: (1) Human-Machine Interfaces, SCADA configurations, and PLCs were the most affected components, (2) 62.86% of vulnerability disclosures in ICS had an architectural root cause, (3) the most common architectural weaknesses were "Improper Input Validation", followed by "Im-proper Neutralization of Input During Web Page Generation" and "Improper Authentication", and (4) most tactic-related vulnerabilities were related to the tactics "Validate Inputs", "Authenticate Actors" and "Authorize Actors".
科研通智能强力驱动
Strongly Powered by AbleSci AI