Skip to main content

Industrial Control Systems Security and Resiliency

Practice and Theory

  • Book
  • © 2019

Overview

  • Provides a comprehensive treatment of the state-of-the-art tools and techniques available for designing secure and resilient industrial control systems, including research prototypes
  • Explores the relationships between cyber, physical and human aspects in industrial control systems and their impact on security and resiliency
  • Brings in both the theoreticians’ and practitioners’ point of view in security and resiliency
  • Offers perspective from international experts in academia, industry and government on where R&D technologies should transition over the next few years to mitigate cyber risk to industrial control systems and ensure their mission continuity

Part of the book series: Advances in Information Security (ADIS, volume 75)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (12 chapters)

  1. Current and New Practice

  2. Cyber-Modeling, Detection, and Forensics

  3. Proactive Defense Mechanism Design

  4. Human System Interface

  5. Metrics

Keywords

About this book

This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.


Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Suchresilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems.


This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

Editors and Affiliations

  • Critical Infrastructure Security and Resilience, Idaho National Laboratory, Idaho Falls, USA

    Craig Rieger

  • Department of Computer Science, Colorado State University, Fort Collins, USA

    Indrajit Ray

  • Department of Electrical and Computer Engineering, Tandon School of Engineering New York University, Brooklyn, USA

    Quanyan Zhu

  • Department of Computer Science, University of Idaho, Idaho Falls, USA

    Michael A. Haney

About the editors

Craig Rieger is the Chief Control Systems Research Engineer at the Idaho National Laboratory (INL), pioneering multidisciplinary research in the area of next generation resilient control systems. In addition, he has organized and chaired nine Institute of Electrical and Electronics Engineers (IEEE) technically co-sponsored symposia and one National Science Foundation workshop in this new research area, and authored more than 40 peer-reviewed publications. He received his PhD in Engineering and Applied Science from Idaho State University in 2008. He is a senior member of IEEE, and has 20 years of software and hardware design experience for process control system upgrades and new installations. He has also been a supervisor and technical lead for control systems engineering groups having design, configuration management, and security responsibilities for several INL nuclear facilities and various control system architectures.


Indrajit Rayis a Professor at the Computer Science Department at Colorado State University. He received his PhD in Information Technology from George Mason University in Fairfax, VA in 1997. His main research interests are in the areas of data and application security, network security, security modeling, risk management, trust models, privacy and digital forensics. He is a member of the Data and Applications Security Group, the Network Security Group, and the Software Assurance Laboratory at Colorado State University. His research has been funded by the U.S. National Science Foundation, the Air Force Office of Scientific Research, the Air Force Research Laboratory and the Federal Aviation Administration. He is a member of IEEE Computer Society, ACM, ACM Special Interest Group on Security Audit and Control, IFIP WG 11.3 on Data and Applications Security and IFIP WG 11.9 on Digital Forensics.


Quanyan Zhu is an Assistant Professor at the Department of Electrical and Computer Engineering at the Polytechnic School of Engineering at the New York University, NY, USA. He received his PhD in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign in 2013. His main research interests are in the areas of Game Theory and Applications, Resilient and Secure Socio-Cyber-Physical Systems, Adversarial Machine Learning and Signal Processing, Human-Robot Interactions, Internet of Things, Game and Decision Theory for Cyber Security, Economics and Optimization of Infrastructure Systems, and Resource Allocations in Communication Networks.


Michael Haney is an Assistant Professor of Computer Science for the University of Idaho and a cybersecurity researcher for the Idaho National Laboratory. He received his master's and doctorate in computer science from the University of Tulsa in 2013 and 2015, respectively. Currently, his research interests are in data visualization, specifically visualizing network andsystem log data to improve intrusion detection and response for large-scale networks. He studies cyber-security issues of energy assurance supporting a more resilient "smart" infrastructure. His focus here lies in honeypot research — creating systems that mimic real power generation systems, oil refineries or water treatment plants, and recording and studying the cyber-attacks against these systems.

Bibliographic Information

  • Book Title: Industrial Control Systems Security and Resiliency

  • Book Subtitle: Practice and Theory

  • Editors: Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney

  • Series Title: Advances in Information Security

  • DOI: https://doi.org/10.1007/978-3-030-18214-4

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer Nature Switzerland AG 2019

  • Hardcover ISBN: 978-3-030-18213-7Published: 30 October 2019

  • Softcover ISBN: 978-3-030-18216-8Published: 30 October 2020

  • eBook ISBN: 978-3-030-18214-4Published: 29 August 2019

  • Series ISSN: 1568-2633

  • Series E-ISSN: 2512-2193

  • Edition Number: 1

  • Number of Pages: X, 276

  • Number of Illustrations: 17 b/w illustrations, 81 illustrations in colour

  • Topics: Security, Computer Communication Networks, Communications Engineering, Networks, Artificial Intelligence

Publish with us