Visible to the public The Urgency of the Threats of Attacks on Interfaces and Field-Layer Protocols in Industrial Control Systems

TitleThe Urgency of the Threats of Attacks on Interfaces and Field-Layer Protocols in Industrial Control Systems
Publication TypeConference Paper
Year of Publication2018
AuthorsIvanov, A. V., Sklyarov, V. A.
Conference Name2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE)
Date Publishedoct
ISBN Number978-1-5386-7054-5
KeywordsCurrent loop, Current measurement, HART-protocol, industrial control, industrial control system, industrial control system field layer, industrial control system information security, industrial control systems, information security systems, integrated circuits, process control, Protocols, pubcrawl, resilience, Resiliency, Scalability, scalable, security of data, Sensors
Abstract

The paper is devoted to analysis of condition of executing devices and sensors of Industrial Control Systems information security. The work contains structures of industrial control systems divided into groups depending on system's layer. The article contains the analysis of analog interfaces work and work features of data transmission protocols in industrial control system field layer. Questions about relevance of industrial control systems information security, both from the point of view of the information security occurring incidents, and from the point of view of regulators' reaction in the form of normative legal acts, are described. During the analysis of the information security systems of industrial control systems a possibility of leakage through technical channels of information leakage at the field layer was found. Potential vectors of the attacks on devices of field layer and data transmission network of an industrial control system are outlined in the article. The relevance analysis of the threats connected with the attacks at the field layer of an industrial control system is carried out, feature of this layer and attractiveness of this kind of attacks is observed.

URLhttps://ieeexplore.ieee.org/document/8546195
DOI10.1109/APEIE.2018.8546195
Citation Keyivanov_urgency_2018