Nowadays, many critical infrastructures are monitored by SCADA systems processing data obtained by underlying sensor networks. Modern SCADA systems are usually networked, also using wireless connections. Thus, security concerns are crucial when developing SCADA applications, as they are increasingly vulnerable to cyber attacks. In this context, the detection of misbehaving nodes is a key issue, which is in general not easy to address due to the logical and physical high distribution of nodes as well as their complex functions in the network. To deal with the above problem, approaches based on information sharing among collaborative components seem suitable. However, all the past proposals based on information sharing only focus on detecting misbehaving sensor nodes without considering all the other SCADA nodes at any level of complexity. In this paper, we present a trust-based approach to detecting high-level compromised nodes in a SCADA system that is based on a competition among agents associated to nodes. Some preliminary experiments we have performed show promising results of the proposed approach in terms of effectiveness and efficiency.
%0 Book Section
%1 BuccafurriComiEtAl13MATES
%A Buccafurri, Francesco
%A Comi, Antonello
%A Lax, Gianluca
%A Rosaci, Domenico
%B Multiagent System Technologies: 11th German Conference, MATES 2013, Koblenz, Germany
%D 2013
%K v1205 springer paper embedded ai sensor network secure software agent middleware information management zzz.sfit
%P 222-235
%R 10.1007/978-3-642-40776-5_20
%T A Trust-Based Approach for Detecting Compromised Nodes in SCADA Systems
%X Nowadays, many critical infrastructures are monitored by SCADA systems processing data obtained by underlying sensor networks. Modern SCADA systems are usually networked, also using wireless connections. Thus, security concerns are crucial when developing SCADA applications, as they are increasingly vulnerable to cyber attacks. In this context, the detection of misbehaving nodes is a key issue, which is in general not easy to address due to the logical and physical high distribution of nodes as well as their complex functions in the network. To deal with the above problem, approaches based on information sharing among collaborative components seem suitable. However, all the past proposals based on information sharing only focus on detecting misbehaving sensor nodes without considering all the other SCADA nodes at any level of complexity. In this paper, we present a trust-based approach to detecting high-level compromised nodes in a SCADA system that is based on a competition among agents associated to nodes. Some preliminary experiments we have performed show promising results of the proposed approach in terms of effectiveness and efficiency.
@incollection{BuccafurriComiEtAl13MATES,
abstract = {Nowadays, many critical infrastructures are monitored by SCADA systems processing data obtained by underlying sensor networks. Modern SCADA systems are usually networked, also using wireless connections. Thus, security concerns are crucial when developing SCADA applications, as they are increasingly vulnerable to cyber attacks. In this context, the detection of misbehaving nodes is a key issue, which is in general not easy to address due to the logical and physical high distribution of nodes as well as their complex functions in the network. To deal with the above problem, approaches based on information sharing among collaborative components seem suitable. However, all the past proposals based on information sharing only focus on detecting misbehaving sensor nodes without considering all the other SCADA nodes at any level of complexity. In this paper, we present a trust-based approach to detecting high-level compromised nodes in a SCADA system that is based on a competition among agents associated to nodes. Some preliminary experiments we have performed show promising results of the proposed approach in terms of effectiveness and efficiency.},
added-at = {2013-11-24T17:13:49.000+0100},
author = {Buccafurri, Francesco and Comi, Antonello and Lax, Gianluca and Rosaci, Domenico},
biburl = {https://www.bibsonomy.org/bibtex/254f602ea6d3dfebfe82c88072140a5db/flint63},
booktitle = {Multiagent System Technologies: 11th German Conference, MATES 2013, Koblenz, Germany},
crossref = {MATES2013},
doi = {10.1007/978-3-642-40776-5_20},
file = {SpringerLink:2013/BuccafurriComiEtAl13MATES.pdf:PDF},
groups = {public},
interhash = {f0544fad1e101b48c13af7025372cd73},
intrahash = {b384402e399ce545f969a8af0d0d2ebe},
keywords = {v1205 springer paper embedded ai sensor network secure software agent middleware information management zzz.sfit},
pages = {222-235},
timestamp = {2014-10-24T14:50:40.000+0200},
title = {A Trust-Based Approach for Detecting Compromised Nodes in {SCADA} Systems},
username = {flint63},
year = 2013
}