Methodology for Conducting a Study of the Vulnerability of PLC Control Algorithms to Cyber Attacks

被引:1
作者
Plamowski, Sebastian [1 ]
Nebeluk, Robert [1 ]
Wojtulewicz, Andrzej [1 ]
Cabaj, Krzysztof [2 ]
Chaber, Patryk [1 ]
Lawrynczuk, Maciej [1 ]
Marusak, Piotr [1 ]
Zarzycki, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Computat Engn, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[2] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Process control; Cyberattack; Software algorithms; Protocols; Monitoring; Hardware; Computer security; Industrial control; Networked control systems; Automatic control; Cybersecurity; industrial control systems; networked control systems; automatic control algorithms; INTERNET;
D O I
10.1109/ACCESS.2024.3461549
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a methodology used to test the vulnerability of control algorithms implemented in an industrial Programmable Logic Controller (PLC) environment to cyber attacks. Three stages of testing are discussed. First, we start with a simulation study conducted in MATLAB. Secondly, the calculations are implemented using a PLC simulator. These initial stages enable quick and efficient identification of the types of attacks to which the algorithms implemented in the PLC are susceptible. Finally, a set of practical tests on a physical laboratory process controlled by PLC is done. Various attack scenarios are considered, and the vulnerability of control algorithms is carefully evaluated. Based on the obtained results, we formulate practical suggestions for reducing the vulnerability of PLC-based industrial control systems.
引用
收藏
页码:135551 / 135563
页数:13
相关论文
共 50 条
[31]   Security Control of Cyber-Physical Systems under Cyber Attacks: A Survey [J].
Xing, Wei ;
Shen, Jun .
SENSORS, 2024, 24 (12)
[32]   Event-Triggered Control for Networked Control Systems under Intermittent Cyber-Attacks [J].
Li, Tao ;
Wang, Ting ;
Chen, Linbo .
2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, :4709-4713
[33]   Adversarial Attacks in Industrial Control Cyber Physical Systems [J].
Figueroa, Henry ;
Wang, Yi ;
Giakos, George C. .
2022 IEEE INTERNATIONAL CONFERENCE ON IMAGING SYSTEMS AND TECHNIQUES (IST 2022), 2022,
[34]   Modeling cyber-attacks on Industrial Control Systems [J].
Paliath, Vivin ;
Shakarian, Paulo .
IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, :316-318
[35]   Resilient Control Strategy of Cyber-Physical System under DoS Attacks [J].
Liu, Shan ;
Xu, Bugong ;
Li, Shanbin ;
Liu, Yonggui .
PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, :7760-7765
[36]   H∞ Control with Multiple Packets Compensation Scheme for T-S Fuzzy Systems Subject to Cyber Attacks [J].
Li, Xiu-Ying ;
Wang, Bao-Jun ;
Zhang, Lei ;
Ma, Xiang-Hua .
INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2021, 19 (01) :230-240
[37]   Dynamic Event-Triggered Fuzzy Control of Networked Unmanned Surface Vehicles Under Hybrid Cyber Attacks [J].
Ma, Yong ;
Hu, Zushuo ;
Qi, Xin ;
Hu, Songlin ;
Xie, Xiangpeng ;
Zhao, Yujiao ;
Chen, Huihui .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2024,
[38]   Resilient-Learning Control of Cyber-Physical Systems Against Mixed-Type Network Attacks [J].
Li, Xiaohang ;
Chadli, Mohammed ;
Tian, Zhaoyang ;
Zhang, Weidong .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (09) :5692-5703
[39]   A Study On Various Cyber Attacks And A Proposed Intelligent System For Monitoring Such Attacks [J].
Choudhary, Atul S. ;
Choudhary, Pankaj P. ;
Salve, Shrikant .
PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, :612-617
[40]   Resilient Tracking Control of Networked Control Systems Under Cyber Attacks [J].
Mousavinejad, Eman ;
Ge, Xiaohua ;
Han, Qing-Long ;
Yang, Fuwen ;
Vlacic, Ljubo .
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (04) :2107-2119