Skip to main content
Log in

Approach to APCS protection from cyber threats

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Protection technologies of initially vulnerable industrial control systems are based on network segregation, the logical separation of the control network from the corporate network, and the use of firewalls. Manufacturers of industrial equipment attempt to embed security functions (of authentication and PLC password protection), but without using additional protection means, the components of these automatic process control systems remain unprotected because of the architecture designed without taking into account information security requirements. In this paper, a comparative analysis of the existing approaches to the APCS protection has been carried out, security criteria for each approach have been formalized, and a new subject-centered approach has been proposed that develops the cyber security paradigm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Moskvin, D.A., APCS security based on detection and elimination of vulnerabilities, Zh. Sist. Vysok. Dostupn., 2013, no. 3, pp. 59–63.

    Google Scholar 

  2. Zegzhda, P.D., Pechenkin, A.I., and Stepanova, T.V., APCS security of power systems that use industrial communication protocols, Izv. Ross. Akad. Nauk, Energ., 2013, no. 5, pp. 59–64.

  3. Leverett, E.P., Quantitatively assessing and visualising industrial system attack surfaces, 2011. http://www.cl. cam.ac.uk/~fms27/papers/2011-Leverett-industrial.pdf

    Google Scholar 

  4. Papa, M. and Shenoi, S., Critical infrastructure protection II, Series: IFIP Advances in Information and Communication Technology, 2010, vol. 290.

    Google Scholar 

  5. Zegzhda, D.P. and Stepanova, T.V., Sustaining a distributed security system by adaptively changing the management structure at random graph, Inf. Obrazov. Nauki, 2012, no. 4 (16), pp. 64–73.

    Google Scholar 

  6. Zegzhda, D.P., From information security to cybersecurity. New challenges and new threats, Sb. Materialov 22-i nauchno-tekhnicheskoi konferentsii “Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii” (Proc. 22th Sci.-Tech. Conf. Methods and Technical Tools of Information Security), St. Petersburg, 2013.

    Google Scholar 

  7. Pleijsier, E., Towards anomaly detection in SCADA networks using connection patterns, 2012. http://referaat.cs.utwente.nl/conference/18/paper/7382/towards-anomaly-detection-in-scada-networks-using-connectionpatterns.pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. P. Zegzhda.

Additional information

Original Russian Text © D.P. Zegzhda, T.V. Stepanova, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zegzhda, D.P., Stepanova, T.V. Approach to APCS protection from cyber threats. Aut. Control Comp. Sci. 49, 659–664 (2015). https://doi.org/10.3103/S0146411615080179

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080179

Keywords

Navigation