Abstract
Protection technologies of initially vulnerable industrial control systems are based on network segregation, the logical separation of the control network from the corporate network, and the use of firewalls. Manufacturers of industrial equipment attempt to embed security functions (of authentication and PLC password protection), but without using additional protection means, the components of these automatic process control systems remain unprotected because of the architecture designed without taking into account information security requirements. In this paper, a comparative analysis of the existing approaches to the APCS protection has been carried out, security criteria for each approach have been formalized, and a new subject-centered approach has been proposed that develops the cyber security paradigm.
Similar content being viewed by others
References
Moskvin, D.A., APCS security based on detection and elimination of vulnerabilities, Zh. Sist. Vysok. Dostupn., 2013, no. 3, pp. 59–63.
Zegzhda, P.D., Pechenkin, A.I., and Stepanova, T.V., APCS security of power systems that use industrial communication protocols, Izv. Ross. Akad. Nauk, Energ., 2013, no. 5, pp. 59–64.
Leverett, E.P., Quantitatively assessing and visualising industrial system attack surfaces, 2011. http://www.cl. cam.ac.uk/~fms27/papers/2011-Leverett-industrial.pdf
Papa, M. and Shenoi, S., Critical infrastructure protection II, Series: IFIP Advances in Information and Communication Technology, 2010, vol. 290.
Zegzhda, D.P. and Stepanova, T.V., Sustaining a distributed security system by adaptively changing the management structure at random graph, Inf. Obrazov. Nauki, 2012, no. 4 (16), pp. 64–73.
Zegzhda, D.P., From information security to cybersecurity. New challenges and new threats, Sb. Materialov 22-i nauchno-tekhnicheskoi konferentsii “Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii” (Proc. 22th Sci.-Tech. Conf. Methods and Technical Tools of Information Security), St. Petersburg, 2013.
Pleijsier, E., Towards anomaly detection in SCADA networks using connection patterns, 2012. http://referaat.cs.utwente.nl/conference/18/paper/7382/towards-anomaly-detection-in-scada-networks-using-connectionpatterns.pdf
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © D.P. Zegzhda, T.V. Stepanova, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy
About this article
Cite this article
Zegzhda, D.P., Stepanova, T.V. Approach to APCS protection from cyber threats. Aut. Control Comp. Sci. 49, 659–664 (2015). https://doi.org/10.3103/S0146411615080179
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080179