PLC Security and Critical Infrastructure Protection

被引:0
|
作者
Sandaruwan, G. P. H. [1 ]
Ranaweera, P. S. [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder UiA, Dept Informat & Commun Technol, N-4898 Grimstad, Norway
关键词
PLC vulnerabilities; PLC security; critical infrastructure protection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to its isolation from the external networks of the system. The attacks such as Stuxnet have proven the incorrectness of such thoughts. In this paper we have revealed the vulnerabilities of PLCs through a variety of attack vectors which could affect the related critical infrastructure. Furthermore, we have proposed solutions for such weaknesses in PLC based systems.
引用
收藏
页码:81 / 85
页数:5
相关论文
共 50 条
  • [31] Challenges in Critical Infrastructure Security
    Leita, Corrado
    DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 1 - 1
  • [32] A SURVEY OF CRITICAL INFRASTRUCTURE SECURITY
    Hurst, William
    Merabti, Madjid
    Fergus, Paul
    CRITICAL INFRASTRUCTURE PROTECTION VIII, 2014, 441 : 127 - 138
  • [33] Leadership for Critical Infrastructure Protection
    Tvaronaviciene, Manuela
    SUSTAINABLE LEADERSHIP FOR ENTREPRENEURS AND ACADEMICS, ESAL2018, 2019, : 389 - 397
  • [34] Critical Infrastructure Protection Editorial
    Shenoi, Sujeet
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 20 : 1 - 2
  • [35] Committed to Protection? Partnerships in Critical Infrastructure Protection
    Koski, Chris
    JOURNAL OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT, 2011, 8 (01):
  • [36] CRITICAL INFRASTRUCTURE PROTECTION WITH MODERN PROTECTION RELAYS
    Ransom, Daniel L.
    2023 IEEE IAS PETROLEUM AND CHEMICAL INDUSTRY TECHNICAL CONFERENCE, PCIC, 2023, : 437 - 445
  • [37] Improve of Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
    Yoo, Dong-Young
    Shin, Jong-Whoi
    Lee, Gang Shin
    Lee, Jae-Il
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 26, PARTS 1 AND 2, DECEMBER 2007, 2007, 26 : 639 - 643
  • [38] CIIP-ram - A security risk analysis methodology for critical information infrastructure protection
    Busuttil, TB
    Warren, AJ
    INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY, 2004, 148 : 33 - 49
  • [39] An integrated cyber security risk management framework and risk predication for the critical infrastructure protection
    Halima Ibrahim Kure
    Shareeful Islam
    Haralambos Mouratidis
    Neural Computing and Applications, 2022, 34 : 15241 - 15271
  • [40] Special Nuclear Material and Critical Infrastructure Security Modeling and Simulation of Physical Protection Systems
    Dominguez, Dean
    Parks, Mancel Jordan
    Williams, Adam D.
    Washburn, Susan
    46TH ANNUAL 2012 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2012, : 10 - 14