Skip to main content

The Issue of Adaptation of Diagnostic System to Protect Industrial Control Systems Against Cyber Threads

  • Conference paper
  • First Online:
Automation 2019 (AUTOMATION 2019)

Abstract

The paper discusses issues related to the adaptation of diagnostic systems to the protection of industrial control systems (ICS) against cyber threats. Typical methods of attacking industrial systems are presented, along with a brief description of exemplary attacks. The potential consequences of attacks on both the operation of supervised industrial installations and the behaviour of operators were also discussed. The vulnerabilities of industrial control systems to attacks have been demonstrated, while the differences between them and typical IT systems were highlighted. Three main groups of ICS protection methods are discussed, their strengths and weaknesses were presented. An important part of the paper is the proposal to change the structure of the diagnostic system so that it would be able to better detect and distinguish between attacks and faults.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Alonso-González, C., Rodriguez, J., Prieto, O., Pulido, B.: Ensemble methods and model based diagnosis using possible conflicts and system decomposition. In: Proceedings of the 23rd International Conference on Industrial Engineering and other Applications of Applied Intelligent Systems, IEA/AIE 10, pp. 116–125. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  • Kościelny, J.M., Syfert, M., Wnuk, P.: The idea of on-line diagnostics as a method of cyberattack. In: International Conference on Diagnostics of Processes and Systems, Advanced Solutions in Diagnostics and Fault Tolerant Control, DPS 2017, Sandomierz, 10–13 September 2017, pp. 449–457. Springer (2017). ISBN 978-3-319-64473-8 ISBN 978-3-319-64474-5 (eBook). https://doi.org/10.1007/978-3-319-64474-5_38

    Google Scholar 

  • Kozak, A., Kościelny, J.M., Pacyna, P., Gołębiewski, D., Paturej, K., Swiątkowska, J.: Cybersecurity of industrial installations – the cornerstone of the “Industry 4.0” project and a chance for Poland. In: White paper on CYBERSEC 2016 (2016). (in Polish)

    Google Scholar 

  • Van Do, L.: Sequential Detection and Isolation of Cyber-physical Attacks on SCADA Systems, Thčse de doctorat de l’UNIVERSITE DE TECHNOLOGIE DE TROYES (2015). 2015TROY0032

    Google Scholar 

  • Bishop, M.: Introduction to Computer Security. Addison-Wesley Professional (2004)

    Google Scholar 

  • DOE: 21 steps to improve cyber security of SCADA networks. Office of Energy Assurance, U.S. Department of Energy (2002)

    Google Scholar 

  • Gritsai, G., Timorin, A., Goltsev, Y, Ilin, R., Gordeychik, S., Karpin, A.: SCADA safety in numbers, Positive Technologies (2012). https://www.ptsecurity.com/ww-en/

  • Krutz, R.L.: Securing SCADA Systems. Wiley Publication (2006)

    Google Scholar 

  • Bajpai, S., Gupta, J.P.: Terror-proofing chemical process industries. Trans IChemE, Part B, Process Saf. Environ. Prot. 85(B6), 559–565 (2007)

    Article  Google Scholar 

  • Kyoung-Dae, K., Kumar, P.R.: Cyber–physical systems: a perspective at the centennial. In: Proceedings of the IEEE, vol. 100, pp. 1287–1308, 13 May 2012

    Google Scholar 

  • Kosmowski, K.T., Sliwinski, M., Barnert, T.: Functional safety and security assessment of the control and protection systems. In: Soares, G., Zio, E. (eds.) Safety and Reliability for Managing Risk. Taylor & Francis Group, London (2006). ISBN 0-415-41620-5

    Google Scholar 

  • Pacyna, P., Rapacz, N., Chmielecki, T., Chołda, P., Potrawka, P., Stankiewicz, R., Wydrych, P., Pach, A.: OKIT. Metodyka ochrony teleinformacyjnych infrastruktur krytycznych. Wyd, PWN (2013)

    Google Scholar 

  • Kościelny, J.M., Bartyś, M.: The requirements for a new layer in the industrial safety systems. In: 9th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, SafeProcess 2015, vol. 1333–1338, Paris, France, 2–4 September 2015. http://www.ifac-papersonline.net/

  • Cárdenas, A.A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y., Sastry, S.: Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 355–366. ACM (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paweł Wnuk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wnuk, P., Kościelny, J.M., Syfert, M., Ciepiela, P. (2020). The Issue of Adaptation of Diagnostic System to Protect Industrial Control Systems Against Cyber Threads. In: Szewczyk, R., Zieliński, C., Kaliczyńska, M. (eds) Automation 2019. AUTOMATION 2019. Advances in Intelligent Systems and Computing, vol 920. Springer, Cham. https://doi.org/10.1007/978-3-030-13273-6_25

Download citation

Publish with us

Policies and ethics