REVIEW ON INFORMATION SECURITY OF INDUSTRIAL CONTROL SYSTEMS
DOI:
https://doi.org/10.53555/eijse.v5i3.42Keywords:
Industrial Control System (ICS), Data Acquisition and Monitoring System (SCADA), Information SecurityAbstract
Industrial control systems (ICS) are widely used in critical infrastructure such as national water resources, power, transportation, energy and so on. These important industrial systems have a profound impact on national security and economic development. In recent years, the occurrence of various security incidents and their serious consequences further reflect the seriousness of the information security situation of industrial control systems. In this paper, the current situation of information security in industrial control systems is summarized and analyzed. The existing problems in ICS information security and the corresponding measures taken are focused on. Furthermore, the problems to be solved and the development direction are pointed out.
References
. Falliere, N., Murchu, L. O., Chien, E., W32. Stuxnet Dossier [Z]. http://www.symantec.com/content/en/ us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf, November 2010.
. Li Yumin. Protection Measures and Application of Information Security in Industrial Control Network [J].China Instruments and Instruments, 2012, 11: 59-64.
. IEC. IEC 62443-2-1Edition 1.0, Industrial communication networks–Network and system security–Part 2-1: Establishing an industrial automation and control system security program[S]. Geneva: IEC, 2010.
. NIST SP800-82. Guide to Industrial Control System (ICS) Security[S]. Gaithersburg, USA: National Institute of Standards and Technology (NIST), 2011.
. Ray A, Åkerberg J, Björkman M, et al. Future research challenges of secure heterogeneous industrial communication networks[C]. IEEE International Conference on Emerging Technologies & Factory Automation, 2016.
. DHS CSSP. Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-DepthStrategies[S]. http://www.us-cert.gov/control_systems/practices/documents/Defense_in_De pth_Oct09.pdf, October 2009.
. DHS CSSP. Common CyberSecurity Vulnerabilities in Industrial Control Systems[S]. http://www.us-cert.gov/ control_systems/practices/documents/DHS_Common_Cybersecurity_Vulnerabilities_IC S_2010.pdf, May 2011.
. ANSI/ISA-99.01.01-2007. Security for Industrial Automation and Control Systems: Terminology, Concepts and Models[S]. Los Angeles, USA: The International Society of Automation (ISA), 2007.
. Stouffer, K., Falco, J., Kent, K. Guide to supervisory control and data acquisition (scada) and industrial control systems security[S]. Sp800-82,NIST, September 2006.
. Stouffer, K., Falco, J., Scarfone, K. Guide to Industrial Control Systems (ICS) Security[S], http://csrc. nist.gov/publications/nistpubs/800-82/SP800-82-final.pdf, 2011.
. Wollschlaeger M, Sauter T, Jasperneite J. The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0[J]. IEEE Industrial Electronics Magazine, 2017, 11(1):17-27.
. Sheela S J, Suresh K V, Tandur D. Security of Industrial Wireless Sensor Networks: A review[C]. International Conference on Trends in Automation, 2016.
. Coffey K, Smith R, Maglaras L, et al. Vulnerability Analysis of Network Scanning on SCADA Systems[J]. Security & Communication Networks, 2018, 2018(4):1-21.
. Vizarreta P, Bemten A V, Sakic E, et al. Incentives for a Softwarization of Wind Park Communication Networks[J]. IEEE Communications Magazine, 2018, PP(99):1-7.
. Genge B, Haller P, Kiss I. Cyber-Security-Aware Network Design of Industrial Control Systems[J]. IEEE Systems Journal, 2017, 11(3):1373-1384.
. Wang Hao, Wu Zhongfu, Wang Ping, Research on Industrial Control Network Security Model[J].Computer Science, 2016, 34(5): 96-98.
. Li Jianjun, Yu Wenjin, Ji Qi, Analysis of the Security Data Interface Model between Enterprise Management and Control Network[J].Computer Age, 2009, 9: 74-76.
. Ralston, P. A. S., Graham, J. H., Hieb, J. L., Cyber security risk assessment for SCADA and DCS networks[J]. ISA Transactions, 2017, 46: 583-594.
. Genge B, Haller P, Kiss I. Cyber-Security-Aware Network Design of Industrial Control Systems[J]. IEEE Systems Journal, 2017, 11(3):1373-1384.
. Alberts, C., Dorofee, A., Stevens, J., Introduction to the OCTAVE Approach. CERT Coordination Center[Z], http://www.cert.org/octave/approach intro.pdf; 2013.
. Aagedal, J., BraberB, F. D., Dimitrakos, T., Model-based risk assessment to improve enterprise security[C]. In Proceedings of the sixth international distributed object computing conference, 2002: 51-62.
. Genge B, Haller P, Kiss I. Cyber-Security-Aware Network Design of Industrial Control Systems[J]. IEEE Systems Journal, 2017, 11(3):1373-1384.
. Cheminod M, Durante L, Seno L. Performance evaluation and modeling of an industrial application-layer firewall[J]. IEEE Transactions on Industrial Informatics, 2018, (99): 1-1.
. Do V L, Fillatre L, Nikiforov I, et al. Feature article: security of SCADA systems against cyber–physical attacks[J]. IEEE Aerospace & Electronic Systems Magazine, 2017, 32(5):28-45.
. Chittester, C. G., Haimes, Y. Y., Risks of terrorism to information technology and to critical interdependent infrastructures[J]. Journal of Homeland Security and Emergency Management, 2014, 1(4): 1-6.
. Haimes, Y. Y., Kaplan, S., Lamber, J. H., Risk filtering, ranking, and management framework using hierarchical holographic modeling[J]. Risk Analysis, 2012, 22(2): 381–95.
. Haimes, Y. Y., Chittester, C. G., A roadmap for quantifying the efficacy of risk management of information security and interdependent scada systems[J]. Journal of Homeland Security and Emergency Management, 2015, 2(2): Article 12.
. Crowther, K. G., Haimes, Y. Y., Application of the inoperability input–output model (IIM) for systemic risk assessment and management of interdependent infrastructures[J]. Systems Engineering, 2015, 8(4): 323-341.
. Fang Laihua, Information Security of Industrial Control System[J].Electrical Era, 2018, 10: 88-121.
. Beaver, C., Gallup, D., Neumann, W., Key Management for SCADA[Z]. http://sandia.org/scada/docum ents/013252.pdf, 2012.
. Colin, R. D., Boyd, C., Manuel, J., KMA-A key management architecture for SCADA systems[C]. In Proceedings of 4th Australasian Information Security Workshop, 2016:138-192.
. Choi, D., Kim, H., Won, D., Advanced key management architecture for secure SCADA communications[J]. IEEE Transaction on Power Delivery, 2009, 24(3): 1154-1163.
. Choi, D., Lee, S., Won, D., Efficient Secure Group Communications for SCADA[J]. IEEE Transaction on Power Delivery, 2010, 25(2): 714-722.
. Kang, D. J., Lee, J. J., Kim, B. H., Proposal strategies of key management for data encryption in SCADA nework of electric power systems[J]. Electrical Power and Energy Systems, 2011, 33: 1521-1526.
. Zhang Shuai, Safety Risk Analysis of ICS Industrial Control System[J].Computer Safety, 2012, 1: 15-19.
. Jeffrey, D., Reed, H., Carlos, D., Aguayo, G. R., Enhancing Smart Grid Cyber Security using Power Fingerprinting: Integrity assessment and intrusion detection[C]. In Proceedings of Future of Instrumentation International Workshop, 2012: 1-3.
. Naedele, M., Addressing IT Security for Critical Control Systems[C]. In Proceedings of 40th Annual Hawaii International Conference on Systems Science, 2017: 115-122.
. Zhang Yungui, Zhao Hua, Wang Lina, Nonparametric CUSUM Intrusion Detection Method Based on Industrial Control Model[J]. Journal of Southeast University: Natural Science Edition, 2012, 42(S1): 55-59.
. Tsang, C. H., Kwong, S., Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction[C]. In the proceedings of IEEE international conference of Industrial Technology, 2015: 51-56.
. Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., Using Model-based Intrusion Detection for SCADA Networks[Z]. http://www.csrdc.us/papers/scadaTDS07/SCADA-IDS-S4-2007. pdf, 2017.
. Berman, D., Butts, J., Towards Characterization of Cyber Attacks on Industrial Control Systems: Emulating Field Devices Using Gumstix Technology[C]. In Proceedings of 5th International Symposium on Resilient Control Systems (ISRCS), 2012: 63-68.
. Li Aiguo, Application of SCTP in Industrial Ethernet Communication Technology[J].Modern Electronic Technology, 2011, 34(3): 160-162.
. Lee S, Lee S, Yoo H, et al. Design and implementation of cybersecurity testbed for industrial IoT systems[J]. Journal of Supercomputing, 2017(20):1-15.
. Gungor V C, Hancke G P. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards[J]. Crc Press, 2017, 81:1-2.
. Hurd, S., Tutorial: Security in Electric Utility Control Systems[C]. In proceedings of 61st Annual Conference of Protective Relay Engineers, 2018: 304-309.
. Ding D, Han Q L, Wang Z, et al. A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems[J]. IEEE Transactions on Industrial Informatics, 2019, 99(99):1-16.
. American Gas Association, Cryptographic protection of SCADA communications: Background, policies and test plan[R]. AGA Report No.12, part 1, http://www.gtiservices.org/security/aga12 wkgdoc homepg.shtml, March 2016.
. Pan F, Pang Z, Luvisotto M, et al. Physical-Layer Security for Industrial Wireless Control Systems: Basics and Future Directions[J]. IEEE Industrial Electronics Magazine, 2018, 12(4):18-27.
. Fang, L., Miao, Q., Wang, C. L., Toward an Analysis Framework for Industrial Control System Malicious Code[J]. IEEE Transaction on Industrial Electronics, 2011: 164-169.
. Addo-Tenkorang R, Helo P T. Analysis of enterprise supply chain communication networks in engineering product development[J]. International Journal of Logistics Management, 2017, 28(1):47-74.
. Qingdao Dofino Information Security Technology Co., Ltd. Analysis and Solution of Hidden Danger of Industrial Network Information Security[Z], http://www.gongkong.com/company/solution/201212270951590 0001.htm, 2012.12
Downloads
Published
Issue
Section
License
Copyright (c) 2019 EPH - International Journal of Science And Engineering (ISSN: 2454 - 2016)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.