GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Walter de Gruyter GmbH  (2)
  • Pharmacy  (2)
Material
Publisher
  • Walter de Gruyter GmbH  (2)
Language
Years
FID
  • Pharmacy  (2)
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    Walter de Gruyter GmbH ; 1998
    In:  auto Vol. 46, No. 4 ( 1998-04), p. 198-206
    In: auto, Walter de Gruyter GmbH, Vol. 46, No. 4 ( 1998-04), p. 198-206
    Type of Medium: Online Resource
    ISSN: 2196-677X , 0178-2312
    RVK:
    RVK:
    RVK:
    Language: English
    Publisher: Walter de Gruyter GmbH
    Publication Date: 1998
    detail.hit.zdb_id: 629186-7
    detail.hit.zdb_id: 2027287-X
    SSG: 15,3
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Walter de Gruyter GmbH ; 2019
    In:  at - Automatisierungstechnik Vol. 67, No. 5 ( 2019-05-27), p. 383-401
    In: at - Automatisierungstechnik, Walter de Gruyter GmbH, Vol. 67, No. 5 ( 2019-05-27), p. 383-401
    Abstract: Industrial automation and control systems (IACS) play a key role in modern production facilities. On the one hand, they provide real-time functionality to the connected field devices. On the other hand, they get more and more connected to local networks and the internet in order to facilitate use cases promoted by “Industrie 4.0”. A lot of IACS are equipped with web servers that provide web applications for configuration and management purposes. If an attacker gains access to such a web application operated on an IACS, he can exploit vulnerabilities and possibly interrupt the critical automation process. Cyber security research for web applications is well-known in the office IT. There exist a lot of best practices and tools for testing web applications for different kinds of vulnerabilities. Security testing targets at discovering those vulnerabilities before they can get exploited. In order to enable IACS manufacturers and integrators to perform security tests for their devices, ISuTest was developed, a modular security testing framework for IACS. This paper provides a classification of known types of web application vulnerabilities. Therefore, it makes use of the worst direct impact of a vulnerability. Based on this analysis, a subset of open-source vulnerability scanners to detect such vulnerabilities is selected to be integrated into ISuTest. Subsequently, the integration is evaluated. This evaluation is twofold: At first, willful vulnerable web applications are used. In a second step, seven real IACS, like a programmable logic controller, industrial switches and cloud gateways, are used. Both evaluation steps start with the manual examination of the web applications for vulnerabilities. They conclude with an automated test of the web applications using the vulnerability scanners automated by ISuTest. The results show that the vulnerability scanners detected 53 % of the existing vulnerabilities. In a former study using commercial vulnerability scanners, 54 % of the security flaws could be found. While performing the analysis, 45 new vulnerabilities were detected. Some of them did not only break the web server but crashed the whole IACS, stopping the critical automation process. This shows that security testing is crucial in the industrial domain and needs to cover all services provided by the devices.
    Type of Medium: Online Resource
    ISSN: 2196-677X , 0178-2312
    RVK:
    RVK:
    RVK:
    Language: English
    Publisher: Walter de Gruyter GmbH
    Publication Date: 2019
    detail.hit.zdb_id: 629186-7
    detail.hit.zdb_id: 2027287-X
    SSG: 15,3
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...