%0 Conference Proceedings %T Cyber-Resilient SCADA Systems via Secure State Restoration %+ Johns Hopkins University Applied Physics Laboratory [Laurel, MD] (APL) %+ The Aerospace Corporation %+ Johns Hopkins University (JHU) %+ CISCO Systems, Inc %+ PayPal [Scottsdale, Arizona] %A Birnbaum, Zachary %A Davis, Matthew %A Salman, Salman %A Schaffter, James %A Watkins, Lanier %A Yamajala, Saikiran %A Paul, Shruti %Z Part 4: Industrial Control Systems Security %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 14th International Conference on Critical Infrastructure Protection (ICCIP) %C Arlington, VA, United States %Y Jason Staggs %Y Sujeet Shenoi %I Springer International Publishing %3 Critical Infrastructure Protection XIV %V AICT-596 %P 183-207 %8 2020-03-16 %D 2020 %R 10.1007/978-3-030-62840-6_9 %K SCADA systems %K Non-persistence %K Fault tolerance %K Cyber resilience %Z Computer Science [cs]Conference papers %X Supervisory control and data acquisition (SCADA) systems are widely used in the critical infrastructure. These systems are high risk targets for cyber attacks due to their criticality, interconnectedness and Internet accessibility. SCADA systems employ programmable logic controllers to monitor and issue control instructions to other devices. Unfortunately, programmable logic controllers are typically configured in a persistent manner – they are configured once and designed to operate continuously. They are, therefore, ill-suited to operate in virtual, dynamic and cyber-resilient environments. SCADA systems must employ cyber-resilient architectures to enable them to endure and recover from cyber attacks.This chapter describes a secure methodology for storing SCADA system states that can be used by redundant, non-persistent devices during operations and recovery. The proposed methodology realizes a non-persistent, Byzantine fault-tolerant, virtual industrial control system architecture whose state and function can be stored and restored securely, contributing to its cyber resilience. Implementation of the methodology in a SCADA environment incorporating non-persistent programmable logic controllers reveals that cyber attacks are identified quickly and secure restoration can occur without loss of state or functionality. Mathematical and timing analyses demonstrate the applicability and efficacy of the methodology in creating cyber-resilient SCADA systems. %G English %Z TC 11 %Z WG 11.10 %2 https://inria.hal.science/hal-03794629/document %2 https://inria.hal.science/hal-03794629/file/497523_1_En_9_Chapter.pdf %L hal-03794629 %U https://inria.hal.science/hal-03794629 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-ICCIP %~ IFIP-WG11-10 %~ IFIP-AICT-596