Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/108421
Citations
Scopus Web of Science® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRanathunga, D.-
dc.contributor.authorRoughan, M.-
dc.contributor.authorKernick, P.-
dc.contributor.authorFalkner, N.-
dc.contributor.authorNguyen, H.-
dc.date.issued2015-
dc.identifier.citationProceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015, pp.37-48-
dc.identifier.isbn9781450334488-
dc.identifier.urihttp://hdl.handle.net/2440/108421-
dc.description.abstractFirewall configuration is a critical activity for the Supervisory Control and Data Acquisition (SCADA) networks that control power stations, water distribution, factory automation, etc. The American National Standards Insti- tute (ANSI) provides specifications for the best practices in developing high-level security policy [9]. However, firewalls continue to be configured manually, a common but error prone process. Automation can make designing firewall configurations more reliable and their deployment increasingly cost-effective. ANSI best practices lack specification in several key aspects needed to allow a firewall to be automatically configured. In this paper we discuss the missing aspects of the existing best practice specifications and propose solutions. We then apply our corrected best practice specifications to real SCADA firewall configurations and evaluate their usefulness for high-level automated specification of firewalls.-
dc.description.statementofresponsibilityDinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung Nguyen-
dc.language.isoen-
dc.publisherACM-
dc.relation.ispartofseriesCPSS ’15-
dc.rightsCopyright © 2015 ACM-
dc.source.urihttp://dx.doi.org/10.1145/2732198.2732201-
dc.subjectSCADA network security; Zone-Conduit model; firewall auto- configuration; security policy-
dc.titleIdentifying the missing aspects of the ANSI/ISA best practices for security policy-
dc.typeConference paper-
dc.contributor.conference1st ACM Workshop on Cyber-Physical System Security (CPSS) (14 Apr 2015 : Singapore, Republic of Singapore)-
dc.identifier.doi10.1145/2732198.2732201-
dc.relation.granthttp://purl.org/au-research/grants/arc/LP100200493-
pubs.publication-statusPublished-
dc.identifier.orcidRanathunga, D. [0000-0002-8665-371X]-
dc.identifier.orcidRoughan, M. [0000-0002-7882-7329]-
dc.identifier.orcidFalkner, N. [0000-0001-7892-6813]-
dc.identifier.orcidNguyen, H. [0000-0003-1028-920X]-
Appears in Collections:Aurora harvest 3
Mathematical Sciences publications

Files in This Item:
File Description SizeFormat 
RA_hdl_108421.pdf
  Restricted Access
Restricted Access1.14 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.