Methodology for Conducting a Study of the Vulnerability of PLC Control Algorithms to Cyber Attacks

被引:1
|
作者
Plamowski, Sebastian [1 ]
Nebeluk, Robert [1 ]
Wojtulewicz, Andrzej [1 ]
Cabaj, Krzysztof [2 ]
Chaber, Patryk [1 ]
Lawrynczuk, Maciej [1 ]
Marusak, Piotr [1 ]
Zarzycki, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Computat Engn, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[2] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Process control; Cyberattack; Software algorithms; Protocols; Monitoring; Hardware; Computer security; Industrial control; Networked control systems; Automatic control; Cybersecurity; industrial control systems; networked control systems; automatic control algorithms; INTERNET;
D O I
10.1109/ACCESS.2024.3461549
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a methodology used to test the vulnerability of control algorithms implemented in an industrial Programmable Logic Controller (PLC) environment to cyber attacks. Three stages of testing are discussed. First, we start with a simulation study conducted in MATLAB. Secondly, the calculations are implemented using a PLC simulator. These initial stages enable quick and efficient identification of the types of attacks to which the algorithms implemented in the PLC are susceptible. Finally, a set of practical tests on a physical laboratory process controlled by PLC is done. Various attack scenarios are considered, and the vulnerability of control algorithms is carefully evaluated. Based on the obtained results, we formulate practical suggestions for reducing the vulnerability of PLC-based industrial control systems.
引用
收藏
页码:135551 / 135563
页数:13
相关论文
共 50 条
  • [1] IoT-Based Electric Vehicle State Estimation and Control Algorithms Under Cyber Attacks
    Rana, Md Masud
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (02): : 874 - 881
  • [2] Detection of Cyber Attacks in Encrypted Control Systems
    Fauser, Moritz
    Zhang, Ping
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 2365 - 2370
  • [3] A US history of not conducting cyber attacks
    Smeets, Max
    BULLETIN OF THE ATOMIC SCIENTISTS, 2022, 78 (04) : 208 - 213
  • [4] A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems
    Mohan, Athira M.
    Meskin, Nader
    Mehrjerdi, Hasan
    ENERGIES, 2020, 13 (15)
  • [5] The Vulnerability of UAVs to Cyber Attacks - An Approach to the Risk Assessment
    Hartmann, Kim
    Steup, Christoph
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [6] GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks
    Zarzycki, Krzysztof
    Chaber, Patryk
    Cabaj, Krzysztof
    Lawrynczuk, Maciej
    Marusak, Piotr
    Nebeluk, Robert
    Plamowski, Sebastian
    Wojtulewicz, Andrzej
    IEEE ACCESS, 2023, 11 : 49587 - 49600
  • [7] Event-Triggered Scheme for Networked Control Systems With Extended Dissipative Control and Cyber Attacks
    Wang, Lei
    Ge, Chao
    Zhang, Ruonan
    Zhang, Xinyuan
    Guo, Wen
    IEEE ACCESS, 2022, 10 : 134491 - 134501
  • [8] Event-Triggered Impulsive Control for Stochastic Networked Control Systems Under Cyber Attacks
    Hu, Zenghui
    Mu, Xiaowu
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (09): : 5636 - 5645
  • [10] How to build a vulnerability benchmark to overcome cyber security attacks
    Akram, Junaid
    Ping, Luo
    IET INFORMATION SECURITY, 2020, 14 (01) : 60 - 71