Cyber security threats in industrial control systems and protection

Mounesh Marali, S. Sudarsan, Ashok Gogioneni
{"title":"Cyber security threats in industrial control systems and protection","authors":"Mounesh Marali, S. Sudarsan, Ashok Gogioneni","doi":"10.1109/ICACCE46606.2019.9079981","DOIUrl":null,"url":null,"abstract":"Industrial automation and control systems are increasingly based on open communication protocols and platforms that are also commonly used in corporate IT environments and interconnected to enable integration with business applications, they become increasingly exposed to the internet. As seen in the past with WannaCry and NotPetya, it's more likely common malware will cause the most damage in the long run. These threats are expected to increase simply since the fundamental gaps in protecting the operational technology (OT) over information technology (IT) widening. As OT becomes increasingly exposed to internet, it tends to become weak spot to cyber threats as any other connected systems. This is basically because of OT components aligned on the same hardware, software, communication protocols including operating systems that run IT components, such as networks, client, server machines & other connected devices. At the same time, reusable development and deployment of interconnected systems and their communication networks become vulnerable to cyber-attacks. This paper explores cyber security issues in industrial control systems that are built on open communication platforms and networks. Specially emphasized on attacker's objectives, electronics methods and possible countermeasures for IT systems. The paper also describes various OT security-relevant characteristics distinct from the office IT systems and relevant implementation approaches at multiple system layers to protect from cyber-attacks. Finally, paper illustrates few application level security concepts with case studies focusing configuration and operation of industrial process control system.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCE46606.2019.9079981","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Industrial automation and control systems are increasingly based on open communication protocols and platforms that are also commonly used in corporate IT environments and interconnected to enable integration with business applications, they become increasingly exposed to the internet. As seen in the past with WannaCry and NotPetya, it's more likely common malware will cause the most damage in the long run. These threats are expected to increase simply since the fundamental gaps in protecting the operational technology (OT) over information technology (IT) widening. As OT becomes increasingly exposed to internet, it tends to become weak spot to cyber threats as any other connected systems. This is basically because of OT components aligned on the same hardware, software, communication protocols including operating systems that run IT components, such as networks, client, server machines & other connected devices. At the same time, reusable development and deployment of interconnected systems and their communication networks become vulnerable to cyber-attacks. This paper explores cyber security issues in industrial control systems that are built on open communication platforms and networks. Specially emphasized on attacker's objectives, electronics methods and possible countermeasures for IT systems. The paper also describes various OT security-relevant characteristics distinct from the office IT systems and relevant implementation approaches at multiple system layers to protect from cyber-attacks. Finally, paper illustrates few application level security concepts with case studies focusing configuration and operation of industrial process control system.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
工业控制系统中的网络安全威胁及防护
工业自动化和控制系统越来越多地基于开放的通信协议和平台,这些协议和平台也经常用于企业IT环境,并相互连接以实现与业务应用程序的集成,它们越来越多地暴露于互联网。就像过去的WannaCry和NotPetya一样,从长远来看,普通恶意软件更有可能造成最大的破坏。由于在保护操作技术(OT)和信息技术(IT)方面的根本差距扩大,预计这些威胁将会增加。随着OT越来越多地暴露于互联网,它往往会像任何其他连接系统一样成为网络威胁的弱点。这主要是因为OT组件在相同的硬件、软件、通信协议上对齐,包括运行IT组件的操作系统,如网络、客户端、服务器机器和其他连接设备。与此同时,互联系统及其通信网络的可重用开发和部署变得容易受到网络攻击。本文探讨了建立在开放通信平台和网络上的工业控制系统的网络安全问题。特别强调攻击者的目标,电子方法和IT系统可能的对策。本文还描述了不同于办公室IT系统的各种OT安全相关特征,以及在多个系统层上防止网络攻击的相关实现方法。最后,以工业过程控制系统的配置和运行为重点,用实例阐述了几个应用层的安全概念。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Big Data Retrieval using HDFS with LZO Compression Robustness Evaluation of Cyber Physical Systems through Network Protocol Fuzzing Efficient Minutiae Matching Algorithm for Fingerprint Recognition A Novel Noise Removal in Digital Mammograms based on Statistical Algorithms Estimation of maximum range for underwater optical communication using PIN and avalanche photodetectors
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1