Skip to main content

Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2012)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7613))

Included in the following conference series:

Abstract

Attacks on Critical Infrastructures are increasing and becoming more sophisticated. In addition to security issues of Supervisory Control And Data Acquisition systems, new threats come from the recent adoption of Wireless Sensor Network (WSN) technologies. Traditional security solutions for solely Information Technology (IT) based infrastructures, such as the Security Information and Events Management (SIEM) systems, can be strongly enchanced to address such issues. In this paper we analyze limits of current SIEMs to protect CIs and propose a framework developed in the MASSIF Project to enhance services for data treatment. We present the Generic Event Translation and introduce the Resilient Storage modules to collect data from heterogeneous sources, improve the intelligence of the SIEM periphery, reliably store information of security breaches. Particularly, by focusing on the first two features, we illustrate how they can improve the detection of attacks targeting the WSN of a dam monitoring and control system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Seung, H.K., Qiu-Hong, W., Johannes, B.U.: A comparative study of cyberattacks. Commun. ACM 55(3), 66–73 (2012), doi:10.1145/2093548.2093568

    Article  Google Scholar 

  2. Symantec ® Applied Research: Symantec 2010 Critical Infrastructure Protection Study (Global Results) (October 2010)

    Google Scholar 

  3. Buttyan, L., Gessner, D., Hessler, A., Langendoerfer, P.: Application of wireless sensor networks in critical infrastructure protection: challenges and design options. Security and Privacy in Emerging Wireless Networks. IEEE Wireless Communications 17(5), 44–49 (2010), doi:10.1109/MWC.2010.5601957

    Article  Google Scholar 

  4. Bai, X., Meng, X., Du, Z., Gong, M., Hu, Z.: Design of Wireless Sensor Network in SCADA System for Wind Power Plant. In: Proceedings of the IEEE International Conference on Automation and Logistics, Qingdao, China (2008)

    Google Scholar 

  5. Minteos DamWatch (2011), http://www.minteos.com/wp-content/uploads/2011/02/Microsoft-Word-minteos-damwatch_ita.pdf

  6. Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology (NIST), SP 800-82 (2011)

    Google Scholar 

  7. MASSIF project, http://www.massif-project.eu/

  8. Bankovic, Z., Vallejo, J.C., Malagon, P., Araujo, I., Moya, J.M.: Eliminating routing protocol anomalies in wireless sensor networks using AI techniques. In: Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security (AISec 2010), pp. 8–13. ACM, New York (2010), doi:10.1145/1866423.1866426

    Chapter  Google Scholar 

  9. Coppolino, L., D’Antonio, S., Romano, L., Spagnuolo, G.: An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies. In: 5th International Conference on Critical Infrastructure (CRIS), pp. 1–8 (2010)

    Google Scholar 

  10. Wang, Q., Wang, S., Meng, Z.: Applying an Intrusion Detection Algorithm to Wireless Sensor Networks. In: Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, pp. 284–287 (2009)

    Google Scholar 

  11. MASSIF project. Scenario requirements Deliverable D2.1.1, Project MASSIF (April 2011)

    Google Scholar 

  12. RSATM Security: RSA enVisionTM Universal Device Support Guide (2008)

    Google Scholar 

  13. AlienVaultTM: Available OSSIM Plugin List (2010)

    Google Scholar 

  14. ArcSightTM: ArcSightTM Smartconnector (2009)

    Google Scholar 

  15. Q1LabsTM: Supported devices, http://q1labs.com/products/supported-devices.aspx

  16. The Committee on the Judiciary House of Representatives: Federal Rules of Evidence (December 2010), http://judiciary.house.gov/hearings/printers/111th/evid2010.pdf

  17. Sousa, P., Bessani, A., Correia, M., Neves, N., Verissimo, P.: Highly available intrusion-tolerant services with proactive-reactive recovery. IEEE Transactions on Parallel and Distributed Systems 21(4) (2010)

    Google Scholar 

  18. BSD Syslog Protocol, RFC 3164, http://www.ietf.org/rfc/rfc3164.txt

  19. Campanile, F., Cilardo, A., Coppolino, L., Romano, L.: Adaptable Parsing of Real-Time Data Streams. In: Proceedings of the 15th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2007), pp. 412–418. IEEE Computer Society, Washington, DC (2007), doi:10.1109/PDP.2007.16

    Chapter  Google Scholar 

  20. Home of SMC: the State Machine Compiler, http://smc.sourceforge.net/

  21. Shoup, V.: Practical Threshold Signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207–220. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  22. Zhu, Q., Hsu, W.W.: Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records. In: Proceedings of the ACM International Conference on Management of Data, Baltimore, Maryland, pp. 395–406 (June 2005)

    Google Scholar 

  23. Langner, R.: Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security and Privacy 9(3), 49–51 (2011), doi:10.1109/MSP.2011.67

    Article  Google Scholar 

  24. Parthasarathy, R., Peterson, N., Song, W.Z., Hurson, A., Behrooz Shirazi, A.: Over the Air Programming on Imote2-Based Sensor Networks. In: 43rd Hawaii International Conference on System Sciences, pp. 1–9 (2010)

    Google Scholar 

  25. McNabb, J.: Vulnerabilities of Wireless Water Meter Networks. In: DEF.CON Hacking Conference (2011)

    Google Scholar 

  26. Mango, Open Surce M2M, http://mango.serotoninsoftware.com/

  27. LibeliumTM Waspmote, http://www.libelium.com/products/waspmote

  28. SnortTM, Network IDS/IPS, http://www.snort.org/

  29. OSSIM AlienVaultTM, http://www.alienvault.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Romano, L., D’Antonio, S., Formicola, V., Coppolino, L. (2012). Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology. In: Ortmeier, F., Daniel, P. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2012. Lecture Notes in Computer Science, vol 7613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33675-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33675-1_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33674-4

  • Online ISBN: 978-3-642-33675-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics