Methodology for Conducting a Study of the Vulnerability of PLC Control Algorithms to Cyber Attacks

被引:1
作者
Plamowski, Sebastian [1 ]
Nebeluk, Robert [1 ]
Wojtulewicz, Andrzej [1 ]
Cabaj, Krzysztof [2 ]
Chaber, Patryk [1 ]
Lawrynczuk, Maciej [1 ]
Marusak, Piotr [1 ]
Zarzycki, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Computat Engn, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[2] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Process control; Cyberattack; Software algorithms; Protocols; Monitoring; Hardware; Computer security; Industrial control; Networked control systems; Automatic control; Cybersecurity; industrial control systems; networked control systems; automatic control algorithms; INTERNET;
D O I
10.1109/ACCESS.2024.3461549
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a methodology used to test the vulnerability of control algorithms implemented in an industrial Programmable Logic Controller (PLC) environment to cyber attacks. Three stages of testing are discussed. First, we start with a simulation study conducted in MATLAB. Secondly, the calculations are implemented using a PLC simulator. These initial stages enable quick and efficient identification of the types of attacks to which the algorithms implemented in the PLC are susceptible. Finally, a set of practical tests on a physical laboratory process controlled by PLC is done. Various attack scenarios are considered, and the vulnerability of control algorithms is carefully evaluated. Based on the obtained results, we formulate practical suggestions for reducing the vulnerability of PLC-based industrial control systems.
引用
收藏
页码:135551 / 135563
页数:13
相关论文
共 50 条
  • [21] Dynamic Event-Triggered Output Feedback Control for Load Frequency Control in Power Systems With Multiple Cyber Attacks
    Chen, Pengcheng
    Zhang, Dan
    Yu, Li
    Yan, Huaicheng
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (10): : 6246 - 6258
  • [22] Networked Control Systems under Cyber Attacks with Applications to Power Networks
    Teixeira, Andre
    Sandberg, Henrik
    Johansson, Karl H.
    2010 AMERICAN CONTROL CONFERENCE, 2010, : 3690 - 3696
  • [23] Resilient sampled-data control of networked control systems against cyber attacks
    Fattahi M.
    Afshar A.
    International Journal of Dynamics and Control, 2020, 8 (01) : 205 - 217
  • [24] Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges
    Mahmoud, Magdi S.
    Hamdan, Mutaz M.
    Baroudi, Uthman A.
    NEUROCOMPUTING, 2019, 338 : 101 - 115
  • [25] Resilient Control for Cyber-Physical Systems Subject to Replay Attacks
    Franze, Giuseppe
    Tedesco, Francesco
    Lucia, Walter
    IEEE CONTROL SYSTEMS LETTERS, 2019, 3 (04): : 984 - 989
  • [26] Stabilization for networked control systems under stochastic cyber-attacks
    Wei, Lili
    Liu, Jinliang
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 8020 - 8025
  • [27] A Vulnerability Assessment Approach for Transportation Networks Subjected to Cyber-Physical Attacks
    Ntafloukas, Konstantinos
    Pasquale, Liliana
    Martinez-Pastor, Beatriz
    McCrum, Daniel P.
    FUTURE INTERNET, 2023, 15 (03):
  • [28] Applying security algorithms against cyber attacks in the distribution automation system
    Lim, I. H.
    Hong, S.
    Choi, M. S.
    Lee, S. J.
    Lee, S. W.
    Ha, B. N.
    2008 IEEE/PES TRANSMISSION & DISTRIBUTION CONFERENCE & EXPOSITION, VOLS 1-3, 2008, : 246 - +
  • [29] Incomplete Information Stochastic Game Theoretic Vulnerability Management for Wide-Area Damping Control Against Cyber Attacks
    Li, Qingyang
    Li, Yang
    Liu, Shichao
    Wang, Xiaozhe
    Chaoui, Hicham
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2022, 12 (01) : 124 - 134
  • [30] Security Control of Cyber-Physical Systems under Cyber Attacks: A Survey
    Xing, Wei
    Shen, Jun
    SENSORS, 2024, 24 (12)