Development of cad for zone dividing of process control networks to improve cyber security

H. Moritani, Shuichi Yogo, Takahito Morita, Midori Kojima, Kento Watanabe, Jing Sun, I. Koshijima, Y. Hashimoto
{"title":"Development of cad for zone dividing of process control networks to improve cyber security","authors":"H. Moritani, Shuichi Yogo, Takahito Morita, Midori Kojima, Kento Watanabe, Jing Sun, I. Koshijima, Y. Hashimoto","doi":"10.1109/ICCAS.2014.6987759","DOIUrl":null,"url":null,"abstract":"Recently, cyber security becomes a serious problem for not only OA (Office Automation) systems but also PA (Process Automation) and FA (Factory Automation) systems. Even the controllers, which are not connected to Internet directly, have been attacked with malwares, such as Stuxnet and Quantum. When control system fails, it may lead to serious accidents such as explosion or leakage of poisonous and deleterious substances. For process control, cyber-attack is one of the causes to threaten safety. The authors of this paper had proposed zone division of process control networks to ensure cyber security and safety. To apply the method, it is necessary to build CE (Cause Effect) matrices which express the qualitative information of the plant and controllers. It is very troublesome for large-scale plants. CAD (Computer Aided Design) tool for zone dividing is proposed in this paper. CE matrices are generated by using DAE (Differential and Algebraic Equation) registered in equipment modules of plant CAD such as ASPEN or Pro II. The candidates of zone division of process control networks, which can assure the safety against concealment and remote operation by cyber attackers, can be proposed.","PeriodicalId":6525,"journal":{"name":"2014 14th International Conference on Control, Automation and Systems (ICCAS 2014)","volume":"16 1","pages":"1311-1316"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 14th International Conference on Control, Automation and Systems (ICCAS 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCAS.2014.6987759","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Recently, cyber security becomes a serious problem for not only OA (Office Automation) systems but also PA (Process Automation) and FA (Factory Automation) systems. Even the controllers, which are not connected to Internet directly, have been attacked with malwares, such as Stuxnet and Quantum. When control system fails, it may lead to serious accidents such as explosion or leakage of poisonous and deleterious substances. For process control, cyber-attack is one of the causes to threaten safety. The authors of this paper had proposed zone division of process control networks to ensure cyber security and safety. To apply the method, it is necessary to build CE (Cause Effect) matrices which express the qualitative information of the plant and controllers. It is very troublesome for large-scale plants. CAD (Computer Aided Design) tool for zone dividing is proposed in this paper. CE matrices are generated by using DAE (Differential and Algebraic Equation) registered in equipment modules of plant CAD such as ASPEN or Pro II. The candidates of zone division of process control networks, which can assure the safety against concealment and remote operation by cyber attackers, can be proposed.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
开发过程控制网络分区cad,提高网络安全
近年来,网络安全不仅是办公自动化(OA)系统的问题,也是过程自动化(PA)和工厂自动化(FA)系统的问题。即使是没有直接连接到互联网的控制器,也受到了诸如Stuxnet和Quantum等恶意软件的攻击。当控制系统发生故障时,可能会导致爆炸或有毒有害物质泄漏等严重事故。对于过程控制来说,网络攻击是威胁安全的原因之一。本文提出了过程控制网络的区域划分,以保证网络安全。为了应用该方法,需要建立CE(因果)矩阵来表达被控对象和控制器的定性信息。对于大型工厂来说,这是非常麻烦的。本文提出了区域划分的计算机辅助设计(CAD)工具。CE矩阵是通过使用DAE(微分和代数方程)生成的,DAE(微分和代数方程)注册在工厂CAD的设备模块中,如ASPEN或Pro II。提出了过程控制网络分区方案,以保证过程控制网络不被网络攻击者隐藏和远程操作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Closed-form formulas for continuous/discrete-time PID controllers' parameters Remote position detection of steel coils using 2D laser scanners: Two-line-tracker Quaternion-based satellite attitude control—A direct parametric approach Development of armour stone covering robots for breakwater construction Development of auto-tuning shift-pattern in Auto-cruise vehicles
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1