Ragnar Schierholz
ABB Ltd
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ragnar Schierholz.
emerging technologies and factory automation | 2009
Hadeli Hadeli; Ragnar Schierholz; Markus Braendle; Cristian Tuduce
Industrial automation and control systems (IACS) today are often based on common IT technologies. However, they often lack security mechanisms and those available in enterprise IT environments are often not suitable for IACS. Other mechanisms require significant manual maintenance which is error prone. In this paper we present an approach that leverages the unique characteristics of IACS, in particular their deterministic behavior and often available formal system description, to reliably detect anomalies and reproducibly generate configurations for security mechanisms such as firewalls. In particular, we extend common IDS technology to also detect an IACS specific anomaly: the missing of required traffic.
ieee international conference on technologies for homeland security | 2009
Hadeli Hadeli; Ragnar Schierholz; Markus Braendle; Cristian Tuduce
Nowadays, industrial control systems operators are trying to fulfill requirements from upcoming standards and regulation regarding cyber security issues. However, addressing such security requirements by implementing security measures is not a trivial task. Moreover, the creation and maintenance of the configuration for the security measures is prone to error. This research shows that it is possible to derive configuration file(s) to setup different security measures based on the input from System Description Files. In addition, we highlight an important anomaly in industrial control systems, namely the missing/tardiness of expected traffic. In this paper, we show how the proposed system works by taking IEC 61850 SCD files and generating configuration files for security measures such as firewall and IDS/IPS. Additionally, current IDS/IPS only raise an alert when unexpected traffic appears in the system. They do not alert on the disappearance of the expected traffic. In fact, this type of anomaly is as critical as the other type of anomaly. Thus, we address this anomaly as well in our research.
Archive | 2009
Christopher Ganz; Bazmi Husain; Martin Naedele; Ragnar Schierholz
americas conference on information systems | 2007
Scott Dynes; Lutz M. Kolbe; Ragnar Schierholz
Archive | 2009
Christopher Ganz; Gaurav Bhargva; Martin Naedele; Ragnar Schierholz
Archive | 2011
Bazmi Husain; Christopher Ganz; Martin Naedele; Ragnar Schierholz
emerging technologies and factory automation | 2014
Sebastian Obermeier; Ragnar Schierholz; Ana Hristova
Archive | 2011
Bazmi Husain; Christopher Ganz; Martin Naedele; Ragnar Schierholz; Michael Wahler; Stefan Richter
Archive | 2014
Hadeli Hadeli; Sebastian Obermeier; Ana Hristova; Ragnar Schierholz
Archive | 2013
Sebastian Obermeier; Ragnar Schierholz; Ana Hristova; Hadeli Hadeli