Industrial Control Systems Security and Resiliency

Practice and Theory

  • Craig Rieger
  • Indrajit Ray
  • Quanyan Zhu
  • Michael A. Haney

Part of the Advances in Information Security book series (ADIS, volume 75)

Table of contents

  1. Front Matter
    Pages i-x
  2. Current and New Practice

    1. Front Matter
      Pages 1-1
    2. Curtis St. Michel, Sarah Freeman
      Pages 17-28
  3. Cyber-Modeling, Detection, and Forensics

    1. Front Matter
      Pages 29-29
    2. Pengyuan Wang, Manimaran Govindarasu
      Pages 31-49
    3. Mohammad Ashiqur Rahman, Ehab Al-Shaer
      Pages 51-69
    4. Pin-Yu Chen, Sutanay Choudhury, Luke Rodriguez, Alfred O. Hero, Indrajit Ray
      Pages 71-92
  4. Proactive Defense Mechanism Design

    1. Front Matter
      Pages 93-93
    2. Benjamin Blakely, William Horsthemke, Alec Poczatec, Lovie Nowak, Nathaniel Evans
      Pages 95-118
    3. Massimiliano Albanese, Sushil Jajodia
      Pages 169-202
    4. Carol Smidts, Xiaoxu Diao, Pavan Kumar Vaddi
      Pages 203-234
  5. Human System Interface

    1. Front Matter
      Pages 235-235
  6. Metrics

    1. Front Matter
      Pages 253-253
    2. Timothy R. McJunkin, Craig Rieger
      Pages 255-276

About this book


This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.

Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems.

This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.


ICS SCADA DCS PLC cyber threats resilient design network security intrusion detection malware operator errors Cyber Security Resilience Cognitive Interdisciplinary Metrics Sensing Consequence Deception Control

Editors and affiliations

  • Craig Rieger
    • 1
  • Indrajit Ray
    • 2
  • Quanyan Zhu
    • 3
  • Michael A. Haney
    • 4
  1. 1.Critical Infrastructure Security and ResilienceIdaho National LaboratoryIdaho FallsUSA
  2. 2.Department of Computer ScienceColorado State UniversityFort CollinsUSA
  3. 3.Department of Electrical and Computer EngineeringTandon School of Engineering New York UniversityBrooklynUSA
  4. 4.Department of Computer ScienceUniversity of IdahoIdaho FallsUSA

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking