5 CONCLUSIONS
The detection system for signal sources with a given
accuracy without the suspension of activities studied
areas of wired communication networks, as
presented in this paper, will reliably protect the
automated control systems from illegal intrusion by
third parties. It will improve the reliability of such
systems in terms of protection against unauthorised
actions by a third party and internal intruder or
malicious software and hardware.
The system is in its final stage of development.
Soon, the authors are planning to go for testing and
further improvement of the existing functionality.
All tests of the hardware-software complex ‘Shield’
are performed in the enterprises of the National
Research Nuclear University MEPhI (Moscow
Engineering Physics Institute).
In the future the functionality of the system will
be expanded: the unit housing the primary
information processing of the localisation system is
to be covered with a layer of radiation-resistant
material as an additional option. This will reduce the
influence of the exposure to ionising radiation on the
results of monitoring. The layer of radiation-resistant
material applied to the surface of the housing unit
for primary data processing will ensure that the unit
is functional in high background radiation
conditions.
Also, the authors plan to develop four solutions
from existing design, which will focus on a specific
type of facility and protected systems:
to protect the automation systems of ‘smart
homes’ and some engineering systems
(heating, air conditioning, multimedia control,
fire alarm);
to protect major smart facilities with automated
control systems and a variety of engineering
systems: underground, business centers,
stadiums, filling stations, etc.;
to protect industrial sites with complex
automated control systems of technological
processes: oil and gas, railways, electric and
nuclear facilities, etc. .;
hardware and software security scanners that
can be used to monitor major smart objects and
industrial facilities.
The provided in a paper study can be used to
improve existing ACS security means, eliminating
the vulnerabilities and ensuring more detailed
protection from attackers.
Moreover, this study can be taken in account
during creation and update of the regulations
governing in the field of automated systems`
security.
REFERENCES
Stouffer, K., Falco, J., and Scarfone, K., 2013. ‘Guide to
Industrial Control Systems (ICS) Security’. NIST
Special Publication 800-82. Revision 1. National
Institute of Standards and Technology, May 2013.
Ibrahimkadic, S., Kreso, S., 2011. ‘Characteristics of
modern industrial control systems’. Proceedings of the
34th International Convention MIPRO. Pages: 845-
849.
Peng Jie, Liu Li., 2011. ‘Industrial Control System
Security’. International Conference on Intelligent
Human-Machine Systems and Cybernetics (IHMSC),
Vol. 2, 2011. Pages: 156-158.
Cotroneo, D., Pecchia, A., Russo, S., 2013. ‘Towards
secure monitoring and control systems: Diversify!’
43rd Annual IEEE/IFIP International Conference on
Dependable Systems and Networks (DSN). Pages: 1-2.
Mikhaylov, D., Zhukov, I., Starikovskiy, A., Zuykov, A.,
Tolstaya, A., Fomin, M., 2013a. ‘Method and System
for Protection of Automated Control Systems for
“Smart Buildings”’. International Journal of
Computer Network and Information Security Vol. 5,
No. 9, July 2013. Рages: 1-8.
Zhukov, I., Mikhailov, D., and Sheremet, I., 2014.
Protection of automated systems against information
technology exposure. Moscow, NRNU MEPhI. 184
pages: illustrated ISBN 978-5-7262-1980-6.
Mikhaylov, D., Zhukov, I., Starikovskiy, A., Zuykov, A.,
Tolstaya, A., Fesenko, S., Sivkov, S., 2013b.
‘Hardware-software complex ensuing information
security of automated building management systems’.
International Journal of Application or Innovation in
Engineering & Management, Vol. 2, Issue 3, March
2013. Рages: 408-412.
Mikhaylov, D., Zhukov, I., Sheremet I.Protecting
information systems from information and technical
influence. Moscow, NRNU MEPhI, 2014. 184 pages.
Melin, A. M., Ferragut, E. M., Laska, J. A., Fugate, D. L.,
Kisner, R., 2013. ‘A mathematical framework for the
analysis of cyber-resilient control systems’. 6th
International Symposium on Resilient Control Systems
(ISRCS). Pages: 13-18.
Mantere, M., Sailio, M., Noponen, S., 2012. ‘Feature
Selection for Machine Learning Based Anomaly
Detection in Industrial Control System Networks’.
IEEE International Conference on Green Computing
and Communications (GreenCom). Pages: 771-774.
Stoian, I., Ignat, S., Capatina, D., Ghiran, O., 2014.
‘Security and intrusion detection on critical SCADA
systems for water management’. IEEE International
Conference on Automation, Quality and Testing,
Robotics. Pages: 1-6.
Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou,
G., Shancang Li., 2014. ‘Managing cyber security
ICEIS2015-17thInternationalConferenceonEnterpriseInformationSystems
250