Industrial Control

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 44043 Experts worldwide ranked by ideXlab platform

Thomas Morris - One of the best experts on this subject based on the ideXlab platform.

  • Industrial Control system cyber attacks
    ICS-CSR 2013 Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research 2013, 2013
    Co-Authors: Thomas Morris
    Abstract:

    This paper presents a set of attacks against SCADA Control systems. The attacks are grouped into 4 classes; reconnaissance, response and measurement injection, command injection and denial of service. The 4 classes are defined and each attack is described in detail. The response and measurement injection and command injection classes are subdivided into sub-classes based on attack complexity. Each attack described in this paper has been exercised against Industrial Control systems in a laboratory setting.

  • An open virtual testbed for Industrial Control system security research
    International Journal of Information Security, 2012
    Co-Authors: Bradley Reaves, Thomas Morris
    Abstract:

    Industrial Control system security has been a topic of scrutiny and research for several years, and many security issues are well known. However, research efforts are impeded by a lack of an open virtual Industrial Control system testbed for security research. This paper describes a virtual testbed framework using Python to create discrete testbed components including virtual devices and process simulators. The virtual testbed is designed such that the testbeds are inter-operable with real Industrial Control system devices and such that the virtual testbeds can provide comparable Industrial Control system network behavior to a laboratory testbed. Two virtual testbeds modeled upon actual laboratory testbeds have been developed and have been shown to be inter-operable with real Industrial Control system equipment and vulnerable to attacks in the same manner as a real system. Additionally, these testbeds have been quantitatively shown to produce traffic close to laboratory systems.

Yong Peng - One of the best experts on this subject based on the ideXlab platform.

  • Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges
    2017
    Co-Authors: Feng Xie, Yang Gao, Weizhong Zhao, Yong Peng, Xuefeng Han
    Abstract:

    Cyber security for Industrial automation and Control systems has been a much discussed topic in recent years. Security evaluation of Industrial Control devices has been gaining rising attention. In this paper, the security evaluation standards for Industrial Control devices are analyzed, and the corresponding several certifications are compared. Meanwhile, this paper proposes several key testing technologies that can be used in evaluation of devices, and analyzes primary difference compared with traditional IT devices. Finally, this paper discussed the challenges facing us in evaluation of Industrial Control devices.

  • CCIS - Malware detection method for the Industrial Control systems
    2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS), 2016
    Co-Authors: Yong Peng, Jie Liang, Guoai Xu
    Abstract:

    Industrial Control system(ICS) is floorboard of Control system in Industrial production. With the transformation and upgrading of ICS, more IT technologies are used in it. The security problem has been paid more and more attention in recent years. In this paper, we proposed a fuzz test based method to detect the malware in the Industrial Control systems. In the proposed method, we use the configuration file of Industrial Control software as the taint source file of taint analysis and the sample file of fuzzing. First, find key data which is most likely to have potential safety hazard in the configuration file through dynamic taint analysis. Then, mutate the data and generate abnormal data file. Last, we do the fuzz test. By using this method, we can detect most of the security hazards

  • Malware detection method for the Industrial Control systems
    2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS), 2016
    Co-Authors: Yong Peng, Jie Liang, Guoai Xu
    Abstract:

    Industrial Control system(ICS) is floorboard of Control system in Industrial production. With the transformation and upgrading of ICS, more IT technologies are used in it. The security problem has been paid more and more attention in recent years. In this paper, we proposed a fuzz test based method to detect the malware in the Industrial Control systems. In the proposed method, we use the configuration file of Industrial Control software as the taint source file of taint analysis and the sample file of fuzzing. First, find key data which is most likely to have potential safety hazard in the configuration file through dynamic taint analysis. Then, mutate the data and generate abnormal data file. Last, we do the fuzz test. By using this method, we can detect most of the security hazards.

  • Industrial Control System Fingerprinting and Anomaly Detection
    2015
    Co-Authors: Yong Peng, Chong Xiang, Dongqing Chen
    Abstract:

    Industrial Control systems are cyber-physical systems that supervise and Control physical processes in critical infrastructures such as electric grids, water and wastewater treatment plants, oil and natural gas pipelines, transportation systems and chemical plants and refineries. Leveraging the stable and persistent Control flow communications patterns in Industrial Control systems, this chapter proposes an innovative Control system fingerprinting methodology that analyzes Industrial Control protocols to capture normal behavior characteristics. The methodology can be used to identify specific physical processes and Control system components in Industrial facilities and detect abnormal behavior. An experimental testbed that incorporates real systems for the cyber domain and simulated systems for the physical domain is used to validate the methodology. The experimental results demonstrate that the fingerprinting methodology holds promise for detecting anomalies in Industrial Control systems and cyber-physical systems used in the critical infrastructure.

  • IIH-MSP - Security Testing Methods and Techniques of Industrial Control Devices
    2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
    Co-Authors: Wei Zhao, Yong Peng, Dejin Wang
    Abstract:

    Stuxnet event in 2010 causes the intense attention all over the world about information security problems of Industrial Control systems, how to assure the security of Industrial Control systems has become a hot topic both in the industry sectors and in academic community. In this paper, we focus on security testing of Industrial Control devices. We first review the existing security certifications in this area and analyze the features of these certifications. Then, we review and describe the existing security standards in this area. Furthermore, we review and compare the testing tools used for security testing of Industrial Control devices. Following this work, we can begin further study in this emerging field.

Bradley Reaves - One of the best experts on this subject based on the ideXlab platform.

  • An open virtual testbed for Industrial Control system security research
    International Journal of Information Security, 2012
    Co-Authors: Bradley Reaves, Thomas Morris
    Abstract:

    Industrial Control system security has been a topic of scrutiny and research for several years, and many security issues are well known. However, research efforts are impeded by a lack of an open virtual Industrial Control system testbed for security research. This paper describes a virtual testbed framework using Python to create discrete testbed components including virtual devices and process simulators. The virtual testbed is designed such that the testbeds are inter-operable with real Industrial Control system devices and such that the virtual testbeds can provide comparable Industrial Control system network behavior to a laboratory testbed. Two virtual testbeds modeled upon actual laboratory testbeds have been developed and have been shown to be inter-operable with real Industrial Control system equipment and vulnerable to attacks in the same manner as a real system. Additionally, these testbeds have been quantitatively shown to produce traffic close to laboratory systems.

Gerhard P Hancke - One of the best experts on this subject based on the ideXlab platform.

  • introduction to Industrial Control networks
    IEEE Communications Surveys and Tutorials, 2013
    Co-Authors: Brendan Galloway, Gerhard P Hancke
    Abstract:

    An Industrial Control network is a system of interconnected equipment used to monitor and Control physical equipment in Industrial environments. These networks differ quite significantly from traditional enterprise networks due to the specific requirements of their operation. Despite the functional differences between Industrial and enterprise networks, a growing integration between the two has been observed. The technology in use in Industrial networks is also beginning to display a greater reliance on Ethernet and web standards, especially at higher levels of the network architecture. This has resulted in a situation where engineers involved in the design and maintenance of Control networks must be familiar with both traditional enterprise concerns, such as network security, as well as traditional Industrial concerns such as determinism and response time. This paper highlights some of the differences between enterprise and Industrial networks, presents a brief history of Industrial networking, gives a high level explanation of some operations specific to Industrial networks, provides an overview of the popular protocols in use and describes current research topics. The purpose of this paper is to serve as an introduction to Industrial Control networks, aimed specifically at those who have had minimal exposure to the field, but have some familiarity with conventional computer networks.

Meicheng Chen - One of the best experts on this subject based on the ideXlab platform.

  • Use of Ethernet for Industrial Control Networks
    2006 1ST IEEE Conference on Industrial Electronics and Applications, 2006
    Co-Authors: Bo Xi, Yanjun Fang, Meicheng Chen
    Abstract:

    There are strong interests of using cheap and simple Ethernet technology for Industrial Control networks. However, traditional Ethernet is shared network using CSMA/CD protocol, which cannot ensure data determination and real-time reliability. Given the measured total delay distribution, this paper analyses the types of real-time data transmitted in Industrial Control networks and illustrate a hypothetical probability density function to describe the total delay in data delivery. Finally, the point of paper is put forward on devising an efficient method to estimate the delay probability of flows, especially those with multiple competing