Hadeli
ABB Ltd
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hadeli.
emerging technologies and factory automation | 2009
Hadeli Hadeli; Ragnar Schierholz; Markus Braendle; Cristian Tuduce
Industrial automation and control systems (IACS) today are often based on common IT technologies. However, they often lack security mechanisms and those available in enterprise IT environments are often not suitable for IACS. Other mechanisms require significant manual maintenance which is error prone. In this paper we present an approach that leverages the unique characteristics of IACS, in particular their deterministic behavior and often available formal system description, to reliably detect anomalies and reproducibly generate configurations for security mechanisms such as firewalls. In particular, we extend common IDS technology to also detect an IACS specific anomaly: the missing of required traffic.
ieee international conference on technologies for homeland security | 2009
Hadeli Hadeli; Ragnar Schierholz; Markus Braendle; Cristian Tuduce
Nowadays, industrial control systems operators are trying to fulfill requirements from upcoming standards and regulation regarding cyber security issues. However, addressing such security requirements by implementing security measures is not a trivial task. Moreover, the creation and maintenance of the configuration for the security measures is prone to error. This research shows that it is possible to derive configuration file(s) to setup different security measures based on the input from System Description Files. In addition, we highlight an important anomaly in industrial control systems, namely the missing/tardiness of expected traffic. In this paper, we show how the proposed system works by taking IEC 61850 SCD files and generating configuration files for security measures such as firewall and IDS/IPS. Additionally, current IDS/IPS only raise an alert when unexpected traffic appears in the system. They do not alert on the disappearance of the expected traffic. In fact, this type of anomaly is as critical as the other type of anomaly. Thus, we address this anomaly as well in our research.
Archive | 2011
Hadeli Hadeli; Thanikesavan Sivanthi; Otmar Goerlitz; Wolfgang Wimmer
Archive | 2014
Hadeli Hadeli; Ana Hristova; Sebastian Obermeier; Philipp Vorst
Archive | 2014
Hadeli Hadeli; Fernando Alvarez; Sebastian Obermeier; Thomas Locher; Ana Hristova
Archive | 2013
Hadeli Hadeli; Thanikesavan Sivanthi; Otmar Goerlitz; Wolfgang Wimmer
Archive | 2014
Manuel Oriol; Sascha Stoeter; Sebastian Obermeier; Ana Hristova; Hadeli Hadeli
Archive | 2013
Sebastian Obermeier; Hadeli Hadeli; Michael Wahler; Sascha Stoeter; Ana Hristova
Archive | 2012
Thanikesavan Sivanthi; Otmar Goerlitz; Hadeli Hadeli
Archive | 2017
Hadeli Hadeli; Otmar Goerlitz; Thanikesavan Sivanthi; Wolfgang Wimmer