{"title":"工业自动化系统中的网络安全分析与措施","authors":"M. Soufian","doi":"10.1109/ISIE.2017.8001538","DOIUrl":null,"url":null,"abstract":"The aim of this research paper is to propose an alternative but possible practical solution to basic key and common security threats such as overloading (Flooding Attacks) and their associated risks to a typical industrial automation system. For this purpose, countermeasures that can be directly implemented in end points regardless of any specific hardware or deployment platform are considered here. These proposed solutions include developing new control systems that can defend associated industrial automation processes and themselves against such attacks, i.e., identifying and building a defense mechanism in control algorithm, and hence named self-defending control strategies. For demonstration an example of such control algorithms was developed and simulation results are presented.","PeriodicalId":6597,"journal":{"name":"2017 IEEE 26th International Symposium on Industrial Electronics (ISIE)","volume":"77 1","pages":"1887-1892"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems\",\"authors\":\"M. Soufian\",\"doi\":\"10.1109/ISIE.2017.8001538\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of this research paper is to propose an alternative but possible practical solution to basic key and common security threats such as overloading (Flooding Attacks) and their associated risks to a typical industrial automation system. For this purpose, countermeasures that can be directly implemented in end points regardless of any specific hardware or deployment platform are considered here. These proposed solutions include developing new control systems that can defend associated industrial automation processes and themselves against such attacks, i.e., identifying and building a defense mechanism in control algorithm, and hence named self-defending control strategies. For demonstration an example of such control algorithms was developed and simulation results are presented.\",\"PeriodicalId\":6597,\"journal\":{\"name\":\"2017 IEEE 26th International Symposium on Industrial Electronics (ISIE)\",\"volume\":\"77 1\",\"pages\":\"1887-1892\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 26th International Symposium on Industrial Electronics (ISIE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIE.2017.8001538\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 26th International Symposium on Industrial Electronics (ISIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIE.2017.8001538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems
The aim of this research paper is to propose an alternative but possible practical solution to basic key and common security threats such as overloading (Flooding Attacks) and their associated risks to a typical industrial automation system. For this purpose, countermeasures that can be directly implemented in end points regardless of any specific hardware or deployment platform are considered here. These proposed solutions include developing new control systems that can defend associated industrial automation processes and themselves against such attacks, i.e., identifying and building a defense mechanism in control algorithm, and hence named self-defending control strategies. For demonstration an example of such control algorithms was developed and simulation results are presented.