Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ragnar Schierholz is active.

Publication


Featured researches published by Ragnar Schierholz.


emerging technologies and factory automation | 2009

Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration

Hadeli Hadeli; Ragnar Schierholz; Markus Braendle; Cristian Tuduce

Industrial automation and control systems (IACS) today are often based on common IT technologies. However, they often lack security mechanisms and those available in enterprise IT environments are often not suitable for IACS. Other mechanisms require significant manual maintenance which is error prone. In this paper we present an approach that leverages the unique characteristics of IACS, in particular their deterministic behavior and often available formal system description, to reliably detect anomalies and reproducibly generate configurations for security mechanisms such as firewalls. In particular, we extend common IDS technology to also detect an IACS specific anomaly: the missing of required traffic.


ieee international conference on technologies for homeland security | 2009

Generating configuration for missing traffic detector and security measures in industrial control systems based on the system description files

Hadeli Hadeli; Ragnar Schierholz; Markus Braendle; Cristian Tuduce

Nowadays, industrial control systems operators are trying to fulfill requirements from upcoming standards and regulation regarding cyber security issues. However, addressing such security requirements by implementing security measures is not a trivial task. Moreover, the creation and maintenance of the configuration for the security measures is prone to error. This research shows that it is possible to derive configuration file(s) to setup different security measures based on the input from System Description Files. In addition, we highlight an important anomaly in industrial control systems, namely the missing/tardiness of expected traffic. In this paper, we show how the proposed system works by taking IEC 61850 SCD files and generating configuration files for security measures such as firewall and IDS/IPS. Additionally, current IDS/IPS only raise an alert when unexpected traffic appears in the system. They do not alert on the disappearance of the expected traffic. In fact, this type of anomaly is as critical as the other type of anomaly. Thus, we address this anomaly as well in our research.


Archive | 2009

Cloud computing for a process control and monitoring system

Christopher Ganz; Bazmi Husain; Martin Naedele; Ragnar Schierholz


americas conference on information systems | 2007

Information Security in the Extended Enterprise: A Research Agenda

Scott Dynes; Lutz M. Kolbe; Ragnar Schierholz


Archive | 2009

Process monitoring system

Christopher Ganz; Gaurav Bhargva; Martin Naedele; Ragnar Schierholz


Archive | 2011

Optimizing power consumption of data centres

Bazmi Husain; Christopher Ganz; Martin Naedele; Ragnar Schierholz


emerging technologies and factory automation | 2014

Securing industrial automation and control systems using application whitelisting

Sebastian Obermeier; Ragnar Schierholz; Ana Hristova


Archive | 2011

Industrial automation system architecture

Bazmi Husain; Christopher Ganz; Martin Naedele; Ragnar Schierholz; Michael Wahler; Stefan Richter


Archive | 2014

Configuration of an industrial control system

Hadeli Hadeli; Sebastian Obermeier; Ana Hristova; Ragnar Schierholz


Archive | 2013

Authentification dans un système de commande industriel

Sebastian Obermeier; Ragnar Schierholz; Ana Hristova; Hadeli Hadeli

Collaboration


Dive into the Ragnar Schierholz's collaboration.

Researchain Logo
Decentralizing Knowledge