Automation Security
نویسنده
چکیده
Introduction Over the past decade, the traditional corporate network has come under siege from a proliferation of viruses and malicious intruders. As a result, numerous network security technologies, methodologies, and policies have been developed to secure the business system. In comparison, process control systems, with their reliance on proprietary networks and hardware, have long been considered immune to cyber attacks. Now, with the move to open standards such as Ethernet, TCP/IP, and web technologies, the plant floor requires its own security procedures to eliminate undesirable access to production systems and to maximize the uptime and efficiency of process networks 1. Web-based Automated Process Control systems are a new type of applications that use the Internet to control industrial processes with the access to the real-time data. Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used 2. IEEE Standard 1402-2000, Guide for Electric Power Substation Physical and Electronic Security, states: " The introduction of computer systems with online access to substation information is significant in that substation relay protection, control, and data collection systems may be exposed to the same vulnerabilities as all other computer systems. As the use of 2 computer equipment within the substation environment increases, the need for security systems to prevent electronic intrusions may become even more important. " It is fortunate, that vulnerabilities of computer systems are well known and well documented. However, it is important to successfully apply that knowledge to industrial networks. Figure 1. presents electronic intrusion vulnerabilities for industrial networks. Over the last 20 years, there were increasingly more complex, sophisticated, and capable control systems installed. These have included more sophisticated basic and advanced regulatory control, advanced process control, optimizers, and artificial intelligence 3. The field of intelligent instrumentation is going through a major transition. The first "smart" transmitters were pioneered by just a few companies some 15 years ago. After a rather slow start in the market, one can say that in the past five …
منابع مشابه
A Reference Model for Control and Automation Systems in Electric Power
Modern infrastructure automation systems are threatened by cyber attack. Their higher visibility in recent years and the increasing use of modern information technology (IT) components contribute to increased security risk. Modeling the relationships among the elements of an automation system will clarify the categories of data and functionality in the system. Then the model can be analyzed for...
متن کاملSecure Virtual Automation Networks based on a Generic Procedure Model
Security is a huge topic, however an international standard for automation control systems is missing. The standardisation work is progressing, e.g. within the IEC. It is clear that behind security there are several well-known security objectives such as availability, integrity and confidentiality. It is also clear that the office domain provides thousands of different security solutions. A pos...
متن کاملSecurity Considerations for Energy Automation Networks
Modern society depends on a reliable energy distribution network. Recent incidents such as the infiltration of a U.S. nuclear power plant together with the impacts of big power outages call for security measures to guarantee supply with energy. This article deals with security goals, attacks, and protection mechanisms for energy automation systems. Nevertheless many of the discussed issues and ...
متن کاملSmarter Home Controller: A Framework for Enhancing Home Security in Smart Grids
Home automation commercial technologies have been deployed as smart grids have extensively grown. Home automation raises the fact that home security needs an abundant amount of attention. In fact, with home automation, all connected appliances are in a critical condition since they are connected to the Internet. The term of cyber security can become an optimal explanation of the most concerned ...
متن کاملSecurity for Industrial Automation and Control Systems
The security of industrial automation and control systems becomes increasingly critical as different networks are connected and systems are integrated in a collaborative manufacturing environment. For industrial automation and control systems the potential impact of an attack may be more serious than for computer systems in general. Users of industrial automation and control systems need to pay...
متن کاملSecurity Analysis of Open Building Automation Systems
With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on physically isolated networks and on “Security by Obscurity”, as it is still common today, is by no means an adequate solution. To be reliable and robust against malicious manipulations, the used communication services must sup...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1404.2347 شماره
صفحات -
تاریخ انتشار 2014