388
views
0
recommends
+1 Recommend
1 collections
    4
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      A Blueprint for a Pan-European Cyber Incident Analysis System

      proceedings-article

      , , , , , , , , , , , , ,

      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)

      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)

      17 - 18 September 2015

      collaborative incident analysis, pan-European coordination, situational awareness

      Bookmark

            Abstract

            Today’s Industrial Control Systems (ICSs) operating in critical infrastructures (CIs) are becoming more and more complex, moreover they are extensively interconnected with corporate information systems for monitoring, management and maintenance. This increasingly exposes ICSs to modern advanced cyber threats. Existing security solutions try to prevent, detect, and react to cyber threats by employing security measures that typically do not cross the organization’s boundaries. However, novel targeted multistage attacks take advantage of interdependencies between organizations and sequentially affect different infrastructures. A coordinated effort to timely reveal such attacks, and promptly outline mitigation strategies is therefore required. In this positioning paper we introduce a collaborative approach to cyber incident information analysis for gaining situational awareness in a European control system security network.

            Content

            Author and article information

            Contributors
            Conference
            September 2015
            September 2015
            : 84-88
            Affiliations
            [0001]AIT Austrian Institute of Technology
            [0002]Airbus Defense and Space
            [0003]ifak Institut fuer Automation

            und Kommunikation e.V. Magdeburg
            [0004]Fraunhofer AISEC, Germany
            [0005]Espion Limited, Ireland
            [0006]VTT, Finland
            Article
            10.14236/ewic/ICS2015.9
            f7dab881-033f-4608-b40e-ed4faea59a60
            © Settanni et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
            ICS-CSR
            3
            Germany
            17 - 18 September 2015
            Electronic Workshops in Computing (eWiC)
            Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            References

            1. ENISA 2010 A step-by-step approach on how to set up a CSIRT Heraklion, Greece European Union Agency for Network and Information Security, Tech. Rep

            2. ENISA 2013 Detect, share, protect Heraklion, Greece EU Agency for Network and Information Security, Tech. Rep

            3. European Commission 2013 Commission proposal for a directive concerning measures to ensure a high common level of network and information security across the union

            4. 2014 A structural design for a pan-European early warning system for critical infrastructures In Elektrotechnik und Informationstechnik Berlin, Germany Springer

            5. NIST 2014 Framework for improving critical infrastructure cybersecurity (2014-02-12)

            6. 2011 Advanced persistent threats and how to monitor and deter them Netw. Security 2011 8 16 19

            7. White House 2013 Executive order (eo13636): Improving critical infrastructure cybersecurity

            Comments

            Comment on this article