Restricting Data Flows to Secure against Remote Attack

John O'Raw, David Laverty

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Fully securing networks from remote attacks is recognized by the IT industry as a critical and imposing challenge. Even highly secure systems remain vulnerable to attacks and advanced persistent threats. Air-gapped networks may be secure from remote attack. One-way flows are a novel approach to improving the security of telemetry for critical infrastructure, retaining some of the benefits of interconnectivity whilst maintaining a level of network security analogous to that of unconnected devices. Simple and inexpensive techniques can be used to provide this unidirectional security, removing the risk of remote attack from a range of potential targets and subnets. The application of one-way networks is demonstrated using IEEE compliant PMU data streams as a case study. Scalability is demonstrated using SDN techniques. Finally, these techniques are combined, demonstrating a node which can be secured from remote attack, within defined limitations.

Original languageEnglish
Title of host publicationInternational Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages4
ISBN (Electronic)9781728164281
DOIs
Publication statusPublished - 13 Jul 2020
Event2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020 - Virtual, Online, Ireland
Duration: 15 Jun 202019 Jun 2020

Conference

Conference2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020
Country/TerritoryIreland
CityVirtual, Online
Period15/06/202019/06/2020

Keywords

  • Data Diode
  • Interiority
  • SDN
  • Security
  • Software Defined Node

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Artificial Intelligence
  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Restricting Data Flows to Secure against Remote Attack'. Together they form a unique fingerprint.

Cite this