Overview of Cyber-Security of Industrial Control System
Overview of Cyber-Security of Industrial Control System
Abstract-With the development of information and so on. ICS has become an important part
technology, the network connection of industrial of national critical infrastructure. Its security
control system (ICS) and information technology is related to our national strategic security. In
(IT) is becoming more and more closely. What’s recent years, some security incidents were
more, the security issues of traditional IT systems
in industrial control system are also more caused due to viruses in domestic electricity,
prominent. Early industrial control system mainly transportation, municipal administration,
uses physical isolation approach to protect petroleum and other industries. And they
security. In this paper, we review the caused certain economic losses. So, the
characteristics and reference models of industrial authorities and users pay more attention to
control system and analyze the current security
these security incidents.
status of industrial control system. Moreover, we
propose a defense-in-depth system, security While the domestic research about
policies of active protection and passive monitoring industrial control system security has just
for these security issues. Besides, we also discuss begun, the importance of intelligent industrial
the key technologies and summarize the full text. control system in electricity, transportation,
petroleum, municipal administration,
Keywords: Industrial Control System (ICS); manufacturing and other fields is becoming
Information security; Risk assessment; Anomaly more and more prominent. The security
detection
threats from information network will
I. INTRODUCTION gradually become the biggest security
challenges for industrial control system. They
A. Introduction of industrial control system are also major problems that we urgently need
The industrial control system (ICS) is to study and solve.
composed of various automation control B. Structure model of Industrial Control
components and process control components for System
real-time data collection and monitoring. The Figure 1.1 describes the reference model
ICS is a management and control system which of industrial control system. It consists of four
can ensure that the industrial technical facilities logical layers which are operation and
run automatically, control and monitor the management, centralized monitoring, on-site
business processes. The core components of ICS equipment and production process. According
are Supervisory Control And Data Acquisition to the different functions and sizes, different
(SCDA), Distributed Control System (DCS), industrial control system contains different
Programmable Logic Controller (PLC), Remote logical layers. The logical layers of production
Terminal Unit (RTU), Intelligent Electronic process, on-site equipment and centralized
Device (IED) and the interface technology which monitoring must be contained in ICS, while
is to ensure the communication of components[1]. the layer of operation and management is
The ICS is commonly used in some areas optional.
such as petroleum, nuclear power plants,
chemical industry, transportation, electricity
time operating system is often limited by nation's critical infrastructure. However, the
resources, while it generally does not include security research of ICS only began in recent
the typical IT security function. There may not years, the safety indicators and assessment
be available computing resources to update methods are not yet ripe. Also, because the
the security features of these systems on the ICS security attacks are mostly large-scale,
ICS components. multi-party cooperation and long duration
z Security consequences. The information (advanced persistent threat) APT attacks,
security of common IT systems does not security assessment methods in traditional
involve industrial processes. It is relatively information systems are not entirely
simple. The most likely scenario is the loss of applicable in this case. Safety indicators which
confidential information, but it will not cause are related with ICS are scarce not only in
direct loss of personnel, equipment and domestic but also in the international. It is not
environment. The information security of easy to form comprehensive and systematic
industrial control system is linked to the safety regulations to assess the safety and
production process. Several situations will guidance for ICS. In addition, with the limit of
occur once the production process is hacked, less data and low objectivity and other factors,
and confidential information will be stolen. it is very difficult to build the quantitative
Whether it is malicious or unintentional, models of ICS safety assessment.
information will be stolen and leaked. If it is C. Lack of security testing technology
malicious, it may damage the production There are significant differences in the
process. performance and security objectives between
ICS systems and traditional IT systems. The
II Security Status of Industrial control intrusion defense strategy on traditional IT
system systems is not effective on the ICS systems.
For ICS systems, intrusion detection is a kind
A. Malicious code and Unauthorized access of network behavior through the collection
In 2010, the Stuxnet virus attacked Iranian and analysis. It detects whether there is
nuclear facilities. It was a wake-up call for the invasion against ICS systems by comparing
whole world. The virus spread through U disk with known intrusion model or making
and other equipment in the local area network decision and analysis for the unknown
and hided in the industrial facilities[7,8]. Finally, intrusion model.
it controlled the normal operation of the Since the research on ICS system intrusion
centrifuge system using the vulnerabilities of detection is still in its infancy at the
operating system. international level, there are a few research
"21 measures to improve SCADA network institutions for the ICS system intrusion
security" which was released by the US detection researches. In this regard the United
Department of Energy requires suppliers of States is in a relatively leading position, while
equipments and systems to provide security the domestic research on ICS system intrusion
functions [9]. What’s more, it required them to detection is basically in a relatively empty
put a patch on the old SCADA system, and stage.
build strong control to anything that might D. Lack of behavior audit
become a SCADA system network backdoor The relatively closed environment in
media. At present, industrial control system in domestic ICS easily let the staff from internal
our country still has potential threat of large- system make mistakes, abuse or intentional
scale cyber attacks. destructive actions in the application system
In addition, because of the traditional level. This is a major security risk faced by
industrial network and network are physical industrial control system. Therefore, it is very
isolation, the communication protocol in necessary to do monitoring, management and
industrial control network didn’t include auditing for the production network access
access control policy such as authentication. behavior, specific control protocol content and
So that attackers can counterfeit legal identity authenticity and integrity of database data. But
to send error information and malicious in the real world, there is usually lack of
command easily. security log audit and configuration changes
B. Lack of risk assessment system management for ICS. This is because some
In recent years, the related security parts of the ICS system may not have the audit
incidents of ICS occurred repeatedly. They function or it can not open the results caused
impacted on various industrial sectors and the by the audit function. At the same time, the
2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC)
Risk assessment can find potential allowed – IDS recorded – command brings the
vulnerabilities in industrial control system, virtual image of the system into a critical state
Abhishek Rakshit and Xinming Ou[20] an alert is raised. In this way, complex
presented an architecture for host-based SCADA attacks will be identified as well.
security analysis, which is not only addresses 2). Incident Response and the
the above stated concerns but also supports Troubleshooting Process
other high level security analysis tools. This Improving the level of industrial control
architecture includes two parts: scanner and system of emergency response and fault
analyzer. diagnosis ability helps the further protection
C. Passive security testing of industrial of the safety of industrial control system.
control system Masatoshi TAKANO[25] proposed ICS network
1). Intrusion Detection Technology security incident response and troubleshooting
Industrial Control System has used to be process. In this approach, Masatoshi
isolated but is now being connected to the TAKANO provided a defense strategy called
outside world. Anomaly detection based “Defense in Depth”, and described the
network monitoring and intrusion detection configuration of each layer in detail. The
systems could be capable of discerning normal multilayered defense with safety functions can
and aberrant traffic in industrial control perform certain emergency actions before the
system, detecting security incidents in an early exploitation of zero-day attack can affect the
phase. Matti Mantere etc.[21] think that which system. In addition, having minimal software
feature best differentiate between anomalous installation and network connections also
and normal behavior is one of the challenges contributes to being robust against an
for a monitoring system. The method used is unknown cyber incident.
machine learning combined with passive D. Comparison of Related Technology
monitoring and a priori knowledge of At present, there are many new types of
protocols used. Matti Mantere and Mirko attack, and the existing technology still has
Sailio [22] proposed a new method which uses many deficiencies. Table 1 is a comparison
self-organizing maps algorithm, and provides table of some methods to deal with common
implement method for the initial features of security attacks.
self-organizing map. TABLE I THE COMPARISON OF
The Modbus protocol is one of the most DIFFERENT SOLUTIONS
commonly used protocols in industrial control
system, but it is vulnerable to flooding attacks.
Sajal Bhatia etc.[23] believed that an anomaly-
based detection algorithm and signature-based
Snort threshold module were capable of
detecting Modbus flooding attacks. The
change detection technique used in this paper
is a variant of the moving average technique
called Exponentially Weighted Moving
Average (EWMA).EWMA examines the
value of the observed parameter and
determines whether it has exceeded a IV. CONCLUSIONS
particular threshold value. EWMA was chosen
because of its simplicity, flexibility, robustness Industrial control system security is a
and effectiveness, especially in detecting high major strategic issue in the national economy
intensity attacks. and people's livelihood. How to protect ICS
Igor Nai Fovino etc.[24] presented a new and prevent it from internal and external
approach on intrusion detection in SCADA security threats and malicious attacks is a
systems, based on the concept of system great challenge of ICS security domain. In this
knowledge base and system state analysis. In paper, we analyze the present situation of the
this approach, by the use of an already current industrial control system domestic and
developed and consolidated system overseas after further study of industrial
description methodology, the system control system network architecture. Then we
knowledge is decomposed in terms of put forward the corresponding security
components, information flows, critical states strategy, and expound the key technology in
and vulnerabilities associated with the detail.
components. In this way, every time an Based on the current analysis, we make a
2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC)