Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number ...Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet,and thus raising security concerns.First of all,we introduce the basic principle of PLC in this paper.Then we analyze the PLC code security,firmware security,network security,virus vulnerability and Modbus communication protocol by reviewing the previous related work.Finally,we make a summary of the current security protection methods.展开更多
Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation inform...Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better.展开更多
In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology o...In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology of deep learning is similar to the idea of intrusion detection.Deep learning is a kind of intelligent algorithm and has the ability of automatically learning.It uses self-learning to enhance the experience and dynamic classification capabilities.We use deep learning to improve the intrusion detection rate and reduce the false alarm rate through learning,a denoising AutoEncoder and three-way decisions intrusion detection method AE-3WD is proposed to improve intrusion detection accuracy.In the processing,deep learning AutoEncoder is used to extract the features of high-dimensional data by combining the coefficient penalty and reconstruction loss function of the encode layer during the training mode.A multi-feature space can be constructed by multiple feature extractions from AutoEncoder,and then a decision for intrusion behavior or normal behavior is made by three-way decisions.NSL-KDD data sets are used to the experiments.The experiment results prove that our proposed method can extract meaningful features and effectively improve the performance of intrusion detection.展开更多
With the development of deep learning and federated learning(FL),federated intrusion detection systems(IDSs)based on deep learning have played a significant role in securing industrial control systems(ICSs).However,ad...With the development of deep learning and federated learning(FL),federated intrusion detection systems(IDSs)based on deep learning have played a significant role in securing industrial control systems(ICSs).However,adversarial attacks on ICSs may compromise the ability of deep learning-based IDSs to accurately detect cyberattacks,leading to serious consequences.Moreover,in the process of generating adversarial samples,the selection of replacement models lacks an effective method,which may not fully expose the vulnerabilities of the models.The authors first propose an automated FL-based method to generate adversarial samples in ICSs,called AFL-GAS,which uses the prin-ciple of transfer attack and fully considers the importance of replacement models during the process of adversarial sample generation.In the proposed AFL-GAS method,a lightweight neural architecture search method is developed to find the optimised replacement model composed of a combination of four lightweight basic blocks.Then,to enhance the adversarial robustness,the authors propose a multi-objective neural archi-tecture search-based IDS method against adversarial attacks in ICSs,called MoNAS-IDSAA,by considering both classification performance on regular samples and adver-sarial robustness simultaneously.The experimental results on three widely used intrusion detection datasets in ICSs,such as secure water treatment(SWaT),Water Distribution,and Power System Attack,demonstrate that the proposed AFL-GAS method has obvious advantages in evasion rate and lightweight compared with other four methods.Besides,the proposed MoNAS-IDSAA method not only has a better classification performance,but also has obvious advantages in model adversarial robustness compared with one manually designed federated adversarial learning-based IDS method.展开更多
Industrial Control Systems(ICS)and SCADA(Supervisory Control and Data Acquisition)systems play a critical role in the management and regulation of critical infrastructure.SCADA systems brings us closer to the real-tim...Industrial Control Systems(ICS)and SCADA(Supervisory Control and Data Acquisition)systems play a critical role in the management and regulation of critical infrastructure.SCADA systems brings us closer to the real-time application world.All process and equipment control capability is typically provided by a Distributed Control System(DCS)in industries such as power stations,agricultural systems,chemical and water treatment plants.Instead of control through DCS,this paper proposes a SCADA and PLC(Programmable Logic Controller)system to control the ratio control division and the assembly line division inside the chemical plant.A specific design and implementation method for development of SCADA/PLC based real time ratio control and automated assembly line system in a chemical plant is introduced.The assembly line division is further divided into sorting stage,filling stage and the auxiliary stage,which includes the capping unit,labelling unit and then the storage.In the ratio control division,we have defined the levels inside the mixer and ratio of the raw materials through human machine interface(HMI)panel.The ratio of raw materials is kept constant on the basis of flow rates of wild stream and manipulated stream.There is a flexibility in defining new levels and the ratios of the raw materials inside the mixer.But here we taken the predefined levels(low,medium,high)and ratios(3:4,2:1,2:5).Control valves are used for regulating the flow of the compositions.In the assembly line division,the containers are sorted on the basis of size and type of material used i.e.,big sized metallic containers and small sized non-metallic containers by inductive and capacitive proximity sensors.All the processes are facilitated with laser beam type or reflective type sensors on the conveyor system.Building a highly stable and dependable PLC/SCADA system instead of Distributed Control System is required to achieve automatic management and control of chemical industry processes to reduce waste manpower and physical resources,as well as to improve worker safety.展开更多
Gradual increase in the number of successful attacks against Industrial Control Systems(ICS)has led to an urgent need to create defense mechanisms for accurate and timely detection of the resulting process anomalies.T...Gradual increase in the number of successful attacks against Industrial Control Systems(ICS)has led to an urgent need to create defense mechanisms for accurate and timely detection of the resulting process anomalies.Towards this end,a class of anomaly detectors,created using data-centric approaches,are gaining attention.Using machine learning algorithms such approaches can automatically learn the process dynamics and control strategies deployed in an ICS.The use of these approaches leads to relatively easier and faster creation of anomaly detectors compared to the use of design-centric approaches that are based on plant physics and design.Despite the advantages,there exist significant challenges and implementation issues in the creation and deployment of detectors generated using machine learning for city-scale plants.In this work,we enumerate and discuss such challenges.Also presented is a series of lessons learned in our attempt to meet these challenges in an operational plant.展开更多
This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention...This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention on three aspects:(i)application of control and detection uni ed framework to enhancing the diagnosis capability of feedback control systems,(ii)projection-based fault detection,and complementary and explainable applications of projection-and machine learning-based techniques,and(iii)system performance degradation detection that is of elemental importance for today's automatic control systems.Some ideas and conceptual schemes are presented and illustrated by means of examples,serving as convincing arguments for research e orts in these aspects.They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems.展开更多
[研究目的]从情报学和情报工作专业视角研究美国商务部工业与安全局(The Bureau of Industry and Secur-ity of U.S.Department of Commerce,BIS)的情报工作,为新时期中国情报学和情报工作创新发展提供参考。[研究方法]通过BIS官方网站...[研究目的]从情报学和情报工作专业视角研究美国商务部工业与安全局(The Bureau of Industry and Secur-ity of U.S.Department of Commerce,BIS)的情报工作,为新时期中国情报学和情报工作创新发展提供参考。[研究方法]通过BIS官方网站信息内容研究、官方网站重要文件研究、瓦森纳协定官方网站信息内容研究、BIS典型执法案例研究相结合的方法,研究BIS情报工作的全貌和精要。[研究结论]从情报学和情报工作专业视角对BIS的组织机构使命、组织网络、信息网络、人际网络、法律保障、典型情报工作、提升美国出口商情报能力的主要工作进行研究,揭示了BIS情报工作全貌、精要和最突出的关键成功因素。展开更多
随着信息化与工业化的融合不断加深,工业控制系统中信息域与物理域交叉部分越来越多,传统信息系统的网络攻击会威胁工业控制系统网络。传统的工业控制系统安全评估方法只考虑功能安全的风险,而忽略了信息安全风险对功能安全的影响。文...随着信息化与工业化的融合不断加深,工业控制系统中信息域与物理域交叉部分越来越多,传统信息系统的网络攻击会威胁工业控制系统网络。传统的工业控制系统安全评估方法只考虑功能安全的风险,而忽略了信息安全风险对功能安全的影响。文中提出一种基于改进petri网的工业控制系统功能安全和信息安全一体化风险建模方法(Safety and Security Petri Net Risk Assessment,SSPN-RA),其中包括一体化风险识别、一体化风险分析、一体化风险评估3个步骤。所提方法首先识别并抽象化工业控制系统中的功能安全与信息安全数据,然后在风险分析过程中通过构造结合Kill Chain的petri网模型,分析出功能安全与信息安全中所存在的协同攻击路径,对petri网中功能安全与信息安全节点进行量化。同时,通过安全事件可能性以及其造成的各类损失计算出风险值,实现对工业控制系统的一体化风险评估。在开源的仿真化工工业控制系统下验证该方法的可行性,并与功能安全故障树分析和信息安全攻击树分析进行对比。实验结果表明,所提方法能够定量地得到工业控制系统的风险值,同时也解决了功能安全与信息安全单一领域分析无法识别的信息物理协同攻击和安全风险问题。展开更多
基金This work is funded by the National Key Research and Development Plan(Grant No.2018YFB0803504)the National Natural Science Foundation of China(Nos.61702223,61702220,61871140,U1636215)the Opening Project of Shanghai Trusted Industrial Control Platform.
文摘Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet,and thus raising security concerns.First of all,we introduce the basic principle of PLC in this paper.Then we analyze the PLC code security,firmware security,network security,virus vulnerability and Modbus communication protocol by reviewing the previous related work.Finally,we make a summary of the current security protection methods.
文摘Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better.
基金supported by National Nature Science Foundation of China (Grant No.61471182)Postgraduate Research&Practice Innovation Program of Jiangsu Province (Grant No.KYCX20_2993)Jiangsu postgraduate research innovation project (SJCX18_0784)。
文摘In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology of deep learning is similar to the idea of intrusion detection.Deep learning is a kind of intelligent algorithm and has the ability of automatically learning.It uses self-learning to enhance the experience and dynamic classification capabilities.We use deep learning to improve the intrusion detection rate and reduce the false alarm rate through learning,a denoising AutoEncoder and three-way decisions intrusion detection method AE-3WD is proposed to improve intrusion detection accuracy.In the processing,deep learning AutoEncoder is used to extract the features of high-dimensional data by combining the coefficient penalty and reconstruction loss function of the encode layer during the training mode.A multi-feature space can be constructed by multiple feature extractions from AutoEncoder,and then a decision for intrusion behavior or normal behavior is made by three-way decisions.NSL-KDD data sets are used to the experiments.The experiment results prove that our proposed method can extract meaningful features and effectively improve the performance of intrusion detection.
基金This work was supported in part by National Natural Science Foundation of China(Grant Nos.61972288 and 92067108)Natural Science Foundation of Guangdong Province(Grant No.2021A151501131)+1 种基金in part by the MIIT Project Industrial Internet identification resolution system security monitoring and protection(Grant No.TC220H078)in part by the Guangdong Key Laboratory of Data Security and Privacy Preserving,National Joint Engineering Research Center of Network Security Detection and Protection Technology.
文摘With the development of deep learning and federated learning(FL),federated intrusion detection systems(IDSs)based on deep learning have played a significant role in securing industrial control systems(ICSs).However,adversarial attacks on ICSs may compromise the ability of deep learning-based IDSs to accurately detect cyberattacks,leading to serious consequences.Moreover,in the process of generating adversarial samples,the selection of replacement models lacks an effective method,which may not fully expose the vulnerabilities of the models.The authors first propose an automated FL-based method to generate adversarial samples in ICSs,called AFL-GAS,which uses the prin-ciple of transfer attack and fully considers the importance of replacement models during the process of adversarial sample generation.In the proposed AFL-GAS method,a lightweight neural architecture search method is developed to find the optimised replacement model composed of a combination of four lightweight basic blocks.Then,to enhance the adversarial robustness,the authors propose a multi-objective neural archi-tecture search-based IDS method against adversarial attacks in ICSs,called MoNAS-IDSAA,by considering both classification performance on regular samples and adver-sarial robustness simultaneously.The experimental results on three widely used intrusion detection datasets in ICSs,such as secure water treatment(SWaT),Water Distribution,and Power System Attack,demonstrate that the proposed AFL-GAS method has obvious advantages in evasion rate and lightweight compared with other four methods.Besides,the proposed MoNAS-IDSAA method not only has a better classification performance,but also has obvious advantages in model adversarial robustness compared with one manually designed federated adversarial learning-based IDS method.
文摘Industrial Control Systems(ICS)and SCADA(Supervisory Control and Data Acquisition)systems play a critical role in the management and regulation of critical infrastructure.SCADA systems brings us closer to the real-time application world.All process and equipment control capability is typically provided by a Distributed Control System(DCS)in industries such as power stations,agricultural systems,chemical and water treatment plants.Instead of control through DCS,this paper proposes a SCADA and PLC(Programmable Logic Controller)system to control the ratio control division and the assembly line division inside the chemical plant.A specific design and implementation method for development of SCADA/PLC based real time ratio control and automated assembly line system in a chemical plant is introduced.The assembly line division is further divided into sorting stage,filling stage and the auxiliary stage,which includes the capping unit,labelling unit and then the storage.In the ratio control division,we have defined the levels inside the mixer and ratio of the raw materials through human machine interface(HMI)panel.The ratio of raw materials is kept constant on the basis of flow rates of wild stream and manipulated stream.There is a flexibility in defining new levels and the ratios of the raw materials inside the mixer.But here we taken the predefined levels(low,medium,high)and ratios(3:4,2:1,2:5).Control valves are used for regulating the flow of the compositions.In the assembly line division,the containers are sorted on the basis of size and type of material used i.e.,big sized metallic containers and small sized non-metallic containers by inductive and capacitive proximity sensors.All the processes are facilitated with laser beam type or reflective type sensors on the conveyor system.Building a highly stable and dependable PLC/SCADA system instead of Distributed Control System is required to achieve automatic management and control of chemical industry processes to reduce waste manpower and physical resources,as well as to improve worker safety.
基金the National Research Foundation(NRF),Prime Minister’s Office,Singapore,under its National Cybersecurity R&D Programme(Award No.NRF2016NCR-NCR002-023 and NRF2018NCR-NSOE005-0001)administered by the National Cybersecurity R&D Directorate.
文摘Gradual increase in the number of successful attacks against Industrial Control Systems(ICS)has led to an urgent need to create defense mechanisms for accurate and timely detection of the resulting process anomalies.Towards this end,a class of anomaly detectors,created using data-centric approaches,are gaining attention.Using machine learning algorithms such approaches can automatically learn the process dynamics and control strategies deployed in an ICS.The use of these approaches leads to relatively easier and faster creation of anomaly detectors compared to the use of design-centric approaches that are based on plant physics and design.Despite the advantages,there exist significant challenges and implementation issues in the creation and deployment of detectors generated using machine learning for city-scale plants.In this work,we enumerate and discuss such challenges.Also presented is a series of lessons learned in our attempt to meet these challenges in an operational plant.
文摘This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention on three aspects:(i)application of control and detection uni ed framework to enhancing the diagnosis capability of feedback control systems,(ii)projection-based fault detection,and complementary and explainable applications of projection-and machine learning-based techniques,and(iii)system performance degradation detection that is of elemental importance for today's automatic control systems.Some ideas and conceptual schemes are presented and illustrated by means of examples,serving as convincing arguments for research e orts in these aspects.They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems.
文摘[研究目的]从情报学和情报工作专业视角研究美国商务部工业与安全局(The Bureau of Industry and Secur-ity of U.S.Department of Commerce,BIS)的情报工作,为新时期中国情报学和情报工作创新发展提供参考。[研究方法]通过BIS官方网站信息内容研究、官方网站重要文件研究、瓦森纳协定官方网站信息内容研究、BIS典型执法案例研究相结合的方法,研究BIS情报工作的全貌和精要。[研究结论]从情报学和情报工作专业视角对BIS的组织机构使命、组织网络、信息网络、人际网络、法律保障、典型情报工作、提升美国出口商情报能力的主要工作进行研究,揭示了BIS情报工作全貌、精要和最突出的关键成功因素。
文摘随着信息化与工业化的融合不断加深,工业控制系统中信息域与物理域交叉部分越来越多,传统信息系统的网络攻击会威胁工业控制系统网络。传统的工业控制系统安全评估方法只考虑功能安全的风险,而忽略了信息安全风险对功能安全的影响。文中提出一种基于改进petri网的工业控制系统功能安全和信息安全一体化风险建模方法(Safety and Security Petri Net Risk Assessment,SSPN-RA),其中包括一体化风险识别、一体化风险分析、一体化风险评估3个步骤。所提方法首先识别并抽象化工业控制系统中的功能安全与信息安全数据,然后在风险分析过程中通过构造结合Kill Chain的petri网模型,分析出功能安全与信息安全中所存在的协同攻击路径,对petri网中功能安全与信息安全节点进行量化。同时,通过安全事件可能性以及其造成的各类损失计算出风险值,实现对工业控制系统的一体化风险评估。在开源的仿真化工工业控制系统下验证该方法的可行性,并与功能安全故障树分析和信息安全攻击树分析进行对比。实验结果表明,所提方法能够定量地得到工业控制系统的风险值,同时也解决了功能安全与信息安全单一领域分析无法识别的信息物理协同攻击和安全风险问题。