An overview of Cyber Attack to Industrial Control System

The relevance of OT (Operational Technology) in Seveso plats has largely increased in recent years thanks to several benefits related to the improvement of efficiency, quality of the production, and cost reduction. Unfortunately, the use of these technologies exposes the plants to cyber threats. Indeed, a cyber-attack may cause the interruption of the production, and, at worst, could manipulate the control process in order to induce a catastrophic event. In recent years, several cyber-attacks have been performed against Industrial Control Systems. In this paper, we provide a process-engineering oriented overview of those attacks with the aim of illustrating their behavior. Particular attention is payed to Triton attack, being the first worm specifically designed to attack a Safety Instrumented System. The paper concludes with some consideration about a relevant approach that might be useful to increase the protection of the Seveso ICS.

[1]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[2]  R. Setola,et al.  The need to improve local self-awareness in CIP/CIIP , 2005, First IEEE International Workshop on Critical Infrastructure Protection (IWCIP'05).

[3]  Federica Pascucci,et al.  Monitoring system reaction in cyber-physical testbed under cyber-attacks , 2017, Comput. Electr. Eng..

[4]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[5]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[6]  Valerio Cozzani,et al.  Analysis of physical and cyber security-related events in the chemical and process industry , 2018 .

[7]  Kevin Jones,et al.  A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..

[8]  Tyson Macaulay,et al.  Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS , 2011 .

[9]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[10]  E.J. Byres,et al.  Industrial cybersecurity for power system and SCADA networks , 2005, Record of Conference Papers Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference.