Infrastructure and Tools for Testing the Vulnerability of Control Systems to Cyberattacks: A Coal Mine Industrial Facility Case

被引:0
作者
Plamowski, Sebastian [1 ]
Chaber, Patryk [1 ]
Lawrynczuk, Maciej [1 ]
Nebeluk, Robert [1 ]
Niewiadomska-Szynkiewicz, Ewa [1 ]
Suchorab, Jakub [1 ]
Zarzycki, Krzysztof [1 ]
Kozakiewicz, Adam [1 ]
Stachurski, Andrzej [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Computat Engn, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 23期
关键词
cybersecurity; cyberattack; testing infrastructure; industrial control system; CYBER SECURITY; ATTACKS; THREAT;
D O I
10.3390/app142311325
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Testing the vulnerability of information systems to cyberattacks is essential to ensure the operational security of organizations and industrial processes. In particular, it is essential to ensure the resilience of industrial processes, as a possible cyberattack can lead to process malfunctions and even process shutdowns, which can lead to substantial economic losses. The possibility of various attacks, e.g., ransomware, phishing, or advanced persistent threats (APTs), requires the evaluation of the effectiveness of cyberattack detection and incident response mechanisms. In industry, it is often impossible to carry out this type of test without risking system disruption, making it difficult to assess the true effectiveness of security features. This article discusses the issues concerned with testing the cyber resilience of a system operating in a real coal mine. First, this work briefly presents the hardware and software architecture used in the coal mine. Secondly, it describes the problem of replicating a real system in the laboratory and the necessary tools and methods used to implement a resilient system architecture. Finally, the scenarios of cyberattacks are detailed, and the obtained results are discussed.
引用
收藏
页数:18
相关论文
共 71 条
[1]   Deep Learning Strategies for Detecting and Mitigating Cyber-Attacks Targeting Water-Energy Nexus [J].
Abughali, Ahmed ;
Alansari, Mohamad ;
Al-Sumaiti, Ameena S. .
IEEE ACCESS, 2024, 12 :129690-129704
[2]   Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things [J].
Al-Hawawreh, Muna ;
den Hartog, Frank ;
Sitnikova, Elena .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) :7137-7151
[3]  
Alvarez-Tuñón O, 2018, IEEE INT C INT ROBOT, P1482, DOI 10.1109/IROS.2018.8594445
[4]  
Amer E., 2023, 2023 INTELLIGENT MET, P99, DOI 10.1109/IMSA58542.2023.10217436
[5]  
Aminossadati SM, 2017, 2017 CONFERENCE ON LASERS AND ELECTRO-OPTICS PACIFIC RIM (CLEO-PR)
[6]  
[Anonymous], About us
[7]  
[Anonymous], About Us
[8]  
attack.mitre, MITRE ATT&CK
[9]  
Bebikhov Y., 2020, P 2020 INT MULT IND, P1
[10]   Challenges of the polish coal mining industry on its way to innovative and sustainable development [J].
Brodny, Jaroslaw ;
Tutak, Magdalena .
JOURNAL OF CLEANER PRODUCTION, 2022, 375