Skip to main content
Log in

Content-based deep communication control for networked control system

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In smart cities, the networked control system plays a significant role in transportation systems, power stations or other critical infrastructures, and it is facing many security issues. From this point, this paper proposes a content-based deep communication control approach to guarantee its security. Based on the layer architecture, this approach analyzes the interactive content in depth according to different industrial communication protocols, and implements the access control between two distinct enclaves. For OPC Classic, we acquire the dynamic port provided by OPC server, and open a new connection belonging to this port; for Modbus/TCP, we not only analyze the ordinary function codes and addresses, but also check the register or coil values by using the multi-bit Trie-tree matching algorithm. Besides, the white-listing strategy is introduced to satisfy the special requirements of industrial communication. Our experiment results show that, on the one hand the proposed approach provides OPC and Modbus/TCP defenses in depth; on the other hand it has less than 1 ms forwarding latency and 0 packet loss rate when the rule number reaches 200, and all these meet the availability requirements in the networked control system. In particular, this approach has been successfully applied in several real-world petrochemical control systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Gupta, R. A., & Chow, M. Y. (2010). Networked control system: Overview and research trends. IEEE Transactions on Industrial Electronics, 57(7), 2527–2535.

    Article  Google Scholar 

  2. Kagermann, H., Wahlster, W., & Helbig, J. (2014). Recommendations for implementing the strategic initiative INDUSTRIE 4.0. Final Report. http://wwwplattform-i40.de/finalreport2013.

  3. Genge, B., Siaterlis, C., Fovino, I. N., & Masera, M. (2012). A cyber-physical experimentation environment for the security analysis of networked industrial control systems. Computer and Electrical Engineering, 38(5), 1146–1161.

    Article  Google Scholar 

  4. Zhang, H., Cheng, P., Shi, L., & Chen, J. (2016). Optimal DoS attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology, 24(3), 843–852.

    Article  Google Scholar 

  5. Lin, S., & Wu, H. (2015). Bloom filter-based secure data forwarding in large ccale cyber-physical systems. Mathematical Problems in Engineering, 2015(1), 1–10.

    Google Scholar 

  6. ICS-CERT. (2015). ICS-CERT year in review 2014. https://ics-cert.us-cert.gov/sites/default/files/Annual_Reports/Year_in_Review_FY2014_Final.

  7. Nourian, A., & Madnick, S. (2015). A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet. IEEE Transactions on Dependable and Secure Computing, 99, 1–20.

    Article  Google Scholar 

  8. Hadziosmanovic, D., Bolzoni, D., Etalle, S., & Hartel, P. (2012). Challenges and opportunities in securing industrial control systems. Proceedings of 2012 Complexity in Engineering (COMPENG12) (pp. 1–6).

  9. Davis, K. R., Davis, C. M., Zonouz, S. A., Bobba, R. B., Berthier, R., Garcia, L., et al. (2015). A cyber-physical modeling and assessment framework for power grid infrastructures. IEEE Transactions on Smart Grid, 6(5), 2464–2475.

    Article  Google Scholar 

  10. Yeole, A. S., & Meshram, B. B. (2011). Analysis of different technique for detection of SQL injection. Proceedings of 2011 International Conference & Workshop on Emerging Trends in Technology (ICWET11) (pp. 963–966).

  11. Stouffer, K., Falco, J., & Scarfone, K. (2011). Guide to industrial control systems (ics) security. National Institute of Standards and Technology (NIST), US Department of Commerce, Technical Report NIST Special Publication (pp. 800–82). http://csrc.nist.gov/publications/nistpubs/800-82/SP800-82-final.

  12. Papp, D., Ma, Z., & Buttyan, L. (2015). Embedded systems security: threats, vulnerabilities, and attack taxonomy. Proceedings of 2015 13th Annual Conference on Privacy, Security and Trust (PST15) (pp. 145–152).

  13. Beresford, D. (2011). Exploiting siemens simatic S7 PLCs. https://media.blackhat.com/bh-us-11/Beresford/BH US11 BeresfordS7 PLCs WP.

  14. Darias, Z., Serhrouchni, A., & Vogel, O. (2015). Taxonomy of attacks on industrial controls protocols. Proceedings of 2015 International Conference on Protocol Engineering (ICPE15) and New Technologies of Distributed Systems (NTDS15) (pp. 1–6).

  15. Zhao, W., Xie, F., Peng, Y., & Gao, Y. (2013). Security testing methods and techniques of industrial control devices. Proceedings of 2013 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP13) (pp. 433–436).

  16. Voyiatzis, A. G., Katsigiannis, K., & Koubias, S. (2015). A Modbus/TCP fuzzer for testing internetworked industrial systems. Proceedings of 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA15) (pp. 1–6).

  17. Igure, V. M., Laughter, S. A., & Williams, R. D. (2006). Security issues in SCADA networks. Computers and Security, 25(7), 498–506.

    Article  Google Scholar 

  18. Cereia, M., Bertolotti, I. C., Durante, L., & Valenzano, A. (2014). Latency evaluation of a firewall for industrial networks based on the Tofino industrial security solution. Proceedings of 2014 IEEE Emerging Technology and Factory Automation (ETFA14) (pp. 1–8).

  19. Zhang, S. S., Shang, W. L., Wan, M., Zhang, H., & Zeng, P. (2014). Security defense module of Modbus TCP communication based on region/enclave rules. Computer Engineering and Design, 35(11), 3701–3707.

    Google Scholar 

  20. Krotofil, M., & Gollmann, D. (2013). Industrial control systems security: what is happening? Proceedings of 2013 11th IEEE International Conference on Industrial Informatics (INDIN13) (pp. 670–675).

  21. Tan, V. V., Yoo, D. S., & Yi, M. J. (2007). Security in automation and control systems based on OPC techniques. Proceedings of 2007 International Forum on Strategic Technology (IFOST07) (pp. 136–140).

  22. Schwarz, M. H., & Borcsok J. (2013). A survey on OPC and OPC-UA: about the standard, developments and investigations. Proceedings of 2013 XXIV International Symposium on Information, Communication and Automation Technologies (ICAT13) (pp. 1–6).

  23. OPC Foundation. (2000). The OPC security custom interface specification. http://opcfoundation.org/.

  24. Wan, M., Shang, W. L., Zeng, P., & Zhao, J. M. (2016). Modbus/TCP communication control method based on deep function code inspection. Information and Control, 45(2), 248–256.

  25. Shang, F. J., Pan, Y. J., Pan, X. Z., & Bin, B. (2008). Research on a stochastic distribution multibit Trie tree IP classification algorithm. Journal on Communications, 29(7), 109–117.

    Google Scholar 

  26. Jiang, W., & Prasanna, V. K. (2013). Data structure optimization for power-efficient IP lookup architectures. IEEE Transactions on Computers, 62(11), 2169–2182.

    Article  Google Scholar 

  27. Pothamsetty, V., & Franz, M. (2004). Transparent Modbus/TCP filtering with Linux. http://modbusfw.sourceforge.net/.

  28. Igor, N. F., Alessio, C., Andrea, C., & Masera, M. (2012). Critical state-based filtering system for securing SCADA network protocols. IEEE Transactions on Industrial Eletronics, 59(10), 3943–3950.

    Article  Google Scholar 

  29. GB/T 20281-2006. (2006). Information security technology-technique requirements and testing and evaluation approaches for firewall products. National Standard of the People’s Republic of China. http://www.spc.org.cn/gb168/.

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61501447, 61502474) and Independent project of Key Laboratory of Networked Control System Chinese Academy of Sciences: Research on abnormal behavior modeling, online intrusion detection and self-learning method in industrial control network. The authors are grateful to the anonymous referees for their insightful comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Wan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wan, M., Shang, W., Kong, L. et al. Content-based deep communication control for networked control system. Telecommun Syst 65, 155–168 (2017). https://doi.org/10.1007/s11235-016-0223-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-016-0223-x

Keywords

Navigation