Architecture for Network Attack Resilient Intrusion Tolerant SCADA

TitleArchitecture for Network Attack Resilient Intrusion Tolerant SCADA
OwnerJohn Hopkins University
Unmet Need:
Today?s SCADA (supervisory control and data acquisition)systems use fault-tolerance techniques to remain available even when parts of the system fail. The systems can be restored after a few hours of downtime during a non-critical time, a tolerance that is considered acceptable today.
However, as malicious attacks become more prevalent, SCADA systems need to be more resilient and responsive to both benign failures and malicious attacks. For example, a sophisticated attacker can take down a primary control center at a critical moment purposefully, causing system downtime at the worst possible time (such as during a snowstorm or during a coordinated large-scale attack in multiple domains). Thus, an architecture that is more robust and able to handle malicious and benign failures while guaranteeing safety and performance will be a much-needed improvement to current SCADA system architectures.
Technical Overview:
Researchers at Johns Hopkins University have developed a resilient architecture that includes protection at both the network and system levels. While previous SCADA systems are engineered to successfully withstand a benign failure within control centers and restore operations within a few hours of downtime, these assumptions may no longer hold against more malicious attacks. The architecture proposed by these researchers protects against both intrusions at the application service level and attacks on the network, which has not been considered before.
To ensure SCADA systems are available continuously in malicious environments means they must account for failures beyond previously considered. This architecture protects against compromises of system components, such as the SCADA master, and network attacks that potentially isolate and disconnect a targeted site from the network. Safety and performance is guaranteed as well, through proactive recovery and guaranteed bounded delay.
Stage of Development:
Patent Information:
Title App Type Country Serial No. Patent No. File Date Issued Date Expire Date Patent Status
Network Attack Resilient Intrusion Tolerant SCADA Architechture PCT: Patent Cooperation Treaty PCT PCT/US2017/038565   6/21/2017     Pending
Applicants:John Hopkins University
Access to additional documentation:Please inquire
Case Ref:C14087
Application number:PCT/US2017/038565
Inventors:Amy Babay, Thomas Tantillo, Yair Amir
Support from inventors:Please inquire
Publication date:2017-06-21
Please fill out the form and press 'send'
Contact Seller
Please provide your contact information below.

Use this form to contact the IP-owner - you should provide an email of your choice for contact. Indicate your interest/reason for the contact.
Disclaimer: Licentix do not guarantee that message sent using this form will be read by the recipient. Please contact us if you are not recieving any response.