Abstract

Industrial control systems (ICS) can be exposed to cyberattacks with potentially catastrophic consequences. Intrusion detection is a fraud prevention technique derived from big data that play a key role in detecting attacks at the earliest stage. Data historian is essential to understanding all events and activities across the network. This article introduces the basic mechanisms by which common attacks on ICS can be detected and analyzed through different forensic tools. We explored the common vulnerabilities and potential attack vectors present in critical infrastructures and described measures that can be deployed to mitigate those threats. We discussed several common attack scenarios and artifacts that a forensic analysis of an affected ICS device can recover to help diagnose an attack. An ICS test lab was implemented and used to examine the common attacks. A menu driven set of forensic tools specific for ICS was developed to allow the extraction and analysis of the resulting attack vector.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.