System of Localisation of the Network Activity Source in APCS Data Lines
D. M. Mikhaylov, S. D. Fesenko, Y. Y. Shumilov, A. V. Zuykov, A. S. Filimontsev, A. M. Tolstaya
2015
Abstract
Automated control system (ACS) is a complex engineering system covering virtually all spheres of industrial production support. The rapid advent of ACS leads to a fast growth of threats aimed at obtaining control over such systems. ACS intrusion may lead to privacy violation, equipment malfunction, loss of time in business processes and even endanger people`s life. This paper proposes a hardware-software complex ‘Shield’ ensuring comprehensive information security of automated control systems, mainly focusing on its hardware part. The system providing localisation of the network activity source in ACS data lines is described as well as its operational principle and main specifications. As the paper deals with the hardware-software complex, efficiency comparison of ‘Shield’ software part with the nearest analogues is presented. The hardware design of ‘Shield’ is now on the final stage, so the testing results of its performance effectiveness are not provided in this paper.
References
- Stouffer, K., Falco, J., and Scarfone, K., 2013. 'Guide to Industrial Control Systems (ICS) Security'. NIST Special Publication 800-82. Revision 1. National Institute of Standards and Technology, May 2013.
- Ibrahimkadic, S., Kreso, S., 2011. 'Characteristics of modern industrial control systems'. Proceedings of the 34th International Convention MIPRO. Pages: 845- 849.
- Peng Jie, Liu Li., 2011. 'Industrial Control System Security'. International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Vol. 2, 2011. Pages: 156-158.
- Cotroneo, D., Pecchia, A., Russo, S., 2013. 'Towards secure monitoring and control systems: Diversify!78 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Pages: 1-2.
- Mikhaylov, D., Zhukov, I., Starikovskiy, A., Zuykov, A., Tolstaya, A., Fomin, M., 2013a. 'Method and System for Protection of Automated Control Systems for “Smart Buildings”78. International Journal of Computer Network and Information Security Vol. 5, No. 9, July 2013. ?ages: 1-8.
- Zhukov, I., Mikhailov, D., and Sheremet, I., 2014. Protection of automated systems against information technology exposure. Moscow, NRNU MEPhI. 184 pages: illustrated ISBN 978-5-7262-1980-6.
- Mikhaylov, D., Zhukov, I., Starikovskiy, A., Zuykov, A., Tolstaya, A., Fesenko, S., Sivkov, S., 2013b. 'Hardware-software complex ensuing information security of automated building management systems'. International Journal of Application or Innovation in Engineering & Management, Vol. 2, Issue 3, March 2013. ?ages: 408-412.
- Mikhaylov, D., Zhukov, I., Sheremet I.Protecting information systems from information and technical influence. Moscow, NRNU MEPhI, 2014. 184 pages.
- Melin, A. M., Ferragut, E. M., Laska, J. A., Fugate, D. L., Kisner, R., 2013. 'A mathematical framework for the analysis of cyber-resilient control systems'. 6th International Symposium on Resilient Control Systems (ISRCS). Pages: 13-18.
- Mantere, M., Sailio, M., Noponen, S., 2012. 'Feature Selection for Machine Learning Based Anomaly Detection in Industrial Control System Networks'. IEEE International Conference on Green Computing and Communications (GreenCom). Pages: 771-774.
- Stoian, I., Ignat, S., Capatina, D., Ghiran, O., 2014. 'Security and intrusion detection on critical SCADA systems for water management'. IEEE International Conference on Automation, Quality and Testing, Robotics. Pages: 1-6.
- Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, G., Shancang Li., 2014. 'Managing cyber security risks in industrial control systems with game theory and viable system modelling'. 9th International Conference on System of Systems Engineering (SOSE). Pages: 266-271.
- Oates, R., Foulkes, D., Herries, G., Banham, D., 2013. 'Practical extensions of safety critical engineering processes for securing industrial control systems'. 8th IET International System Safety Conference incorporating the Cyber Security Conference. Pages: 1-6.
- MAXPATROL, 2014. Compliance and vulnerability management system. Positive Technologies, London. URL: http://www.ptsecurity.com/maxpatrol/kf/ MaxPatrol %20product%20leaflet_eng.pdf.
- XSpider, 2014. Positive Technologies, Moscow. URL: http://www.ptsecurity.ru/files/ XSpider_7.8.pdf.
- Vulnerability Scanner 'SCADA-auditor' JSC 'NTC Stankoinformzaschita', 2014. Moscow. URL: http://cisforum.ru/assets/images/Prez/Polyansky_AV_Stankoin formzachita.pdf.
- Vilain, M., Dupont, B., 2008. 'Device for detecting electromagnetic radiation, comprising a resistive imaging bolometer, system comprising an array of such devices and a method for reading imaging bolometer of such a system'. Patent RU No. 2486689, 10 Oct 2008.
- Goto, A., Yuasa, Y., Tanaka, S., Akatsu, N., Sakamoto, K., Sakamoto, H., Yamamoto, A., 2000. 'Inductiontype linear position detector device'. Patent US 6034624 A, 7 Mar 2000.
- Starikovskiy, A., Zhukov, I., Mikhaylov, D., Sheptunov, A., Savchuk, A., Krimov, A., 2012. 'Improving the security of automation systems for buildings management from cyber attacks'. Construction equipment and communication, No. 4, July-August 2012, Moscow. Pages: 2-5.
- Beltov, A., Novitsky, A., Konev, V., Fomin, M., Evseev, V., Fesenko, S., 2012. 'Analysis of vulnerabilities of smart home automation technology'. Construction equipment and communication No. 4, July-August 2012, Moscow. Pages: 15-19.
Paper Citation
in Harvard Style
M. Mikhaylov D., D. Fesenko S., Y. Shumilov Y., V. Zuykov A., S. Filimontsev A. and M. Tolstaya A. (2015). System of Localisation of the Network Activity Source in APCS Data Lines . In Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-097-0, pages 245-251. DOI: 10.5220/0005332202450251
in Bibtex Style
@conference{iceis15,
author={D. M. Mikhaylov and S. D. Fesenko and Y. Y. Shumilov and A. V. Zuykov and A. S. Filimontsev and A. M. Tolstaya},
title={System of Localisation of the Network Activity Source in APCS Data Lines},
booktitle={Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2015},
pages={245-251},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005332202450251},
isbn={978-989-758-097-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - System of Localisation of the Network Activity Source in APCS Data Lines
SN - 978-989-758-097-0
AU - M. Mikhaylov D.
AU - D. Fesenko S.
AU - Y. Shumilov Y.
AU - V. Zuykov A.
AU - S. Filimontsev A.
AU - M. Tolstaya A.
PY - 2015
SP - 245
EP - 251
DO - 10.5220/0005332202450251