PLC Security and Critical Infrastructure Protection

被引:0
|
作者
Sandaruwan, G. P. H. [1 ]
Ranaweera, P. S. [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder UiA, Dept Informat & Commun Technol, N-4898 Grimstad, Norway
关键词
PLC vulnerabilities; PLC security; critical infrastructure protection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to its isolation from the external networks of the system. The attacks such as Stuxnet have proven the incorrectness of such thoughts. In this paper we have revealed the vulnerabilities of PLCs through a variety of attack vectors which could affect the related critical infrastructure. Furthermore, we have proposed solutions for such weaknesses in PLC based systems.
引用
收藏
页码:81 / 85
页数:5
相关论文
共 50 条
  • [21] Critical infrastructure protection
    Goetz, Eric
    Shenoi, Sujeet
    [J]. IFIP Advances in Information and Communication Technology, 2008, 253
  • [22] Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection
    Asgary, Ali
    [J]. JOURNAL OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT, 2009, 6 (01):
  • [23] Cybersecurity in the Context of Criminal Law Protection of the State Security and Sectors of Critical Infrastructure
    Kelemen, Miroslav
    Szabo, Stanislav
    Vajdova, Iveta
    [J]. CHALLENGES TO NATIONAL DEFENCE IN CONTEMPORARY GEOPOLITICAL SITUATION (CNDCGS' 2018), 2018, : 100 - 104
  • [24] Security and the performative politics of resilience: Critical infrastructure protection and humanitarian emergency preparedness
    Brassett, James
    Vaughan-Williams, Nick
    [J]. SECURITY DIALOGUE, 2015, 46 (01) : 32 - 50
  • [25] Achieving Critical Infrastructure Protection through the Interaction of Computer Security and Network Forensics
    Hunt, Ray
    Slay, Jill
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 23 - 30
  • [26] Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
    Park, Soon-Tai
    Shin, Jong-Whoi
    Min, Bog-Ki
    Lee, Ik-Sub
    Lee, Gang-Shin
    Lee, Jae-Il
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 14, 2006, 14 : 37 - 40
  • [27] Supply Chain Management Security: The Weak Link of Australian Critical Infrastructure Protection
    Warren, Matthew
    Leitch, Shona
    [J]. PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 240 - 246
  • [28] Security of Classified Information as Part of the National Critical Infrastructure Protection: Macedonian Experience
    Slaveski, Stojan
    Bakreski, Oliver
    [J]. COMPREHENSIVE APPROACH AS SINE QUA NON FOR CRITICAL INFRASTRUCTURE PROTECTION, 2015, 39 : 107 - 119
  • [29] Security of strategic infrastructures - the European and Austrian Critical Infrastructure Protection (CIP) program
    Pschikal A.
    [J]. Elektrotechnik und Informationstechnik, 2010, 127 (09): : 242 - 244
  • [30] Challenges in Critical Infrastructure Security
    Leita, Corrado
    [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 1 - 1