Fourth Industrial Revolution

How can we protect critical infrastructure from cyber attacks?

Carlos Queiroz

The systems responsible for controlling and monitoring most of our national infrastructure – the services that our society relies on, are known as Supervisory Control and Data Acquisition (SCADA) systems.

These systems, on which infrastructure such as power stations, water distribution, roads and public transport rely on, are increasingly the target of cybercriminals. Needless to say, any disruptions to such systems could at best result in financial disasters and at worst the loss of lives.

Faced with increasing and more sophisticated cyber attacks, governments and the private sector need to find increasingly innovative ways to protect themselves. These are the weapons of the future. There will be future wars based on this – you don’t need to attack a country’s military when you can attack it economically. If you stop the electrical system of New York, New York will collapse.

In the past, SCADA and consequently the systems monitored and controlled by them were somewhat protected because they relied on proprietary technologies, with little awareness held in the IT industry. With a very closed industry, little information spread beyond the SCADA community. Today, SCADA systems have evolved from standalone, proprietary solutions and closed networks into large-scale, highly distributed computing systems operating over open networks such as the internet. In addition the hardware and software utilised by SCADA systems are now, in most cases, based on COTS (Commercial Off-The-Shelf) solutions.

Although such changes have increased the efficiency and sophistication of the services provided, they have also increased their vulnerability to malicious and sophisticated attacks. The once closed, proprietary software and hardware infrastructure is now vulnerable to attacks originating from external (internet) and internal corporate networks. The attacks plaguing such systems are the same ones that have been affecting ordinary systems over the years, such as viruses, trojans and worms. Additionally, the network protocols used by SCADA systems were not designed with security requirements in mind. For instance, the majority of protocols do not support any type of encryption.

Over the last few years there has been a push from the computer security industry seeking to adapt its security tools and techniques to address the security issues of SCADA systems. You can see this in the number of conferences dedicated or with tracks dedicated to SCADA systems.

At the same time, the US government together with industry has put in place a set of standards and regulations related to protecting SCADA systems. Those initiatives are on the right track to probably reach the level of security currently deployed on enterprise and personal computer systems. However as we all know, this is not sufficient, otherwise successful malicious attacks on computer systems would be non-existent.

No more security through obscurity

For many years the security industry has tried to improve and fix the security on computer systems. Security has improved immensely over the last decade, but we are nowhere close to totally secure systems. Statements made by people from the security industry corroborate this view. Recently, a CTO of a security company wrote about why anti-virus companies did not catch viruses such as Stuxnet and Flame, worms built to attack SCADA systems. He acknowledged anti-virus products made for regular consumers will not protect against well-resourced adversaries. This means many things. First, the use of COTS hardware and software in critical systems may be a terrible idea. Second, anti-virus companies will never reach the level of sophistication of a well-resourced adversary.

Given the growing awareness of the internals of SCADA systems, the once proudly used “security through obscurity” mantra no longer applies. Searching for the keyword “SCADA” on the Open Source Vulnerability Database (OSVDB), an initiative that catalogues vulnerabilities on computers returns more than 300 hits (vulnerabilities).

Living with malicious attacks

Security systems based on prevention and interdiction are not offering the desired level of security, and are not enough for SCADA systems, which have different requirements to general corporate systems. SCADA systems are widely spread, they rely on multiple technologies, they have limited resources, they are a mixture of real-time and not real-time operations and more importantly they have different needs regarding their availability, reliability and security, among other things.

Rather than trying to achieve an attack-free system, the focus is shifting to provisioning of an acceptable level of services even in the presence of malicious attacks. Various researchers from Cyberspace and Security Group at RMIT are tackling these issues, including devising new models to improve availability of services even if cyber attacks occur (through replication of essential services). They are also working on detecting attacks in real-time (using new clustering algorithms to summarise data and detect abnormal behavior). The future is about making systems robust enough that they can survive and keep operating during an attack.

This article was originally published on The Conversation. Read the original article. Publication does not imply endorsement of views by the World Economic Forum.

To keep up with the Agenda subscribe to our weekly newsletter.

Author: Zahir Tari is a Professor in Distributed Systems, School of Computer Science and IT at RMIT University. Carlos Queiroz is a PhD at RMIT University.

Image: A magnifying glass is held in front of a computer screen in this picture illustration. REUTERS/Pawel Kopczynski.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Stay up to date:

The Digital Economy

Related topics:
Fourth Industrial RevolutionIndustries in Depth
Share:
The Big Picture
Explore and monitor how The Digital Economy is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

We asked 5 tech strategy leaders about inclusive, ethical and responsible use of technology. Here's what they said

Daniel Dobrygowski and Bart Valkhof

November 21, 2024

Why is human-first design essential to the future of the internet?

About us

Engage with us

  • Sign in
  • Partner with us
  • Become a member
  • Sign up for our press releases
  • Subscribe to our newsletters
  • Contact us

Quick links

Language editions

Privacy Policy & Terms of Service

Sitemap

© 2024 World Economic Forum