skip to main content
10.1145/3357613.3357633acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Method of identifying and assessing of automated process control systems vulnerable elements

Published:12 September 2019Publication History

ABSTRACT

The purpose of this work is to improve quality of developed threat models for automated process control system (APCs) information security. In accordance with the purpose of the work the authors set the task to develop a method for identifying potential vulnerable elements typical for multi-level APCs and their assessing in order to calculate probability of vulnerability implementation. The peculiarities of APCs that determine occurrence of threats to information security and vulnerable elements are considered. Possible types of threats to information security that can be implemented by an intruder in APCs are given. While carrying out the task the authors propose a method for identifying actual vulnerable system elements. The estimation of APCs security on the basis of the applied security measure analysis is carried out. A way to determine the probability of favorable conditions when using vulnerabilities and formation of the final list of vulnerable elements of APCs is proposed. While confirming efficiency of the developed method, the authors calculate assessment of implementation probability of APCs vulnerabilities through actual vulnerable elements. Implementation of the results into APCs will increase fault tolerance, find potential weaknesses of developed APCs and decrease their operation and protection costs. The results of the research are recommended to use when designing information security systems in APCs.

References

  1. D. V. Chernov, A. A. Sychugov, "Analysis of modern requirements and problems of information security of automated process control systems," Neurocomputers, no. 8, pp. 38--46, 2018. Google ScholarGoogle ScholarCross RefCross Ref
  2. A. Zhilenkov, D. Gilyazov, Power line communication in IoT-systems, 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2017. Google ScholarGoogle ScholarCross RefCross Ref
  3. Metodika opredelenia aktualnih ugroz personalnih dannih pri ih obrabotke v informatsionnih cictemah personalnih dannih» [Methods for determining actual threats to personal data when processing them in personal data information systems] Russia FSTEC. http://fstec.ru.Google ScholarGoogle Scholar
  4. D. V. Chernov, A. A. Sychugov, "The formalization of an intruder model of information security of APCs," Proc. of the Tula states university. Technical science, no. 10, pp. 22--27, 2018.Google ScholarGoogle Scholar
  5. D. V. Chernov, A. A. Sychugov, Formalizirovannoe predstavlenie potentsiala narushitetya informatsionnoj bezopasnosti ASUTP [Formalized representation of a potential intruder of information security of automated process control systems], Nauchnij zhurnal. Voprosi kiberbezopasnosti, modelirovania i obrabotki informatsii v sovremennih sociotechnicheskih cictemah, no. 6, pp. 49--55, 2018.Google ScholarGoogle Scholar
  6. E. Bolelov, A. Sbitnev, Informatsionnaya bezopasnost telecommunicatsionnih system: posobie po vipolnenniyu prakticheskih zanyatij [Information security of telecommunication systems: practical exercise guide], Moscow, MSTU GA, 2014.Google ScholarGoogle Scholar
  7. V. Kolomoitcev, K. Bodrov, Calculating the probability of detection and removal of threats to information security in data channels, 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM), 2016. Google ScholarGoogle ScholarCross RefCross Ref
  8. V. Semin, A. Kabanov, A statistical approach to the assessment of security threats information system, 2017 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS), 2017. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Method of identifying and assessing of automated process control systems vulnerable elements

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader