Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems

The aim of this research paper is to propose an alternative but possible practical solution to basic key and common security threats such as overloading (Flooding Attacks) and their associated risks to a typical industrial automation system. For this purpose, countermeasures that can be directly implemented in end points regardless of any specific hardware or deployment platform are considered here. These proposed solutions include developing new control systems that can defend associated industrial automation processes and themselves against such attacks, i.e., identifying and building a defense mechanism in control algorithm, and hence named self-defending control strategies. For demonstration an example of such control algorithms was developed and simulation results are presented.

[1]  Jeffrey L. Hieb,et al.  Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.

[2]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[3]  Majeed Soufian Dynamic optimisation of an industrial web process , 2008 .

[4]  Gary B. Lamont,et al.  Digital control systems--theory, hardware, software , 1985 .

[5]  Nabanita Mandal,et al.  A survey on network security tools for open source , 2016, 2016 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC).

[6]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[7]  Dong Wei,et al.  Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.

[8]  Steve Gold Feature: The SCADA challenge: securing critical infrastructure , 2009 .

[9]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .

[10]  A. Treytl,et al.  Security measures in automation systems-a practice-oriented approach , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.

[11]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[12]  Ken Munro SCADA: SCADA - A critical situation , 2008 .

[13]  Henning Trsek,et al.  Cloud computing for industrial automation systems — A comprehensive overview , 2013, 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA).

[14]  Kevin Jones,et al.  A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..

[15]  W. Marsden I and J , 2012 .