Abstract
Abstract
Adversaries may target alerting alarms raised by PLCs (Programmable Logic Controllers) to prevent notifying operators of critical conditions, to hide faults, to disrupt operations, to cause damages to ICS (Industrial Control Systems) and surrounding environment, or to lead to financial loss. The paper focuses on exposing vulnerabilities of the ladder logic code that handles the alerting alarm messages and how to mitigate them. A real-time test bed of a PLC alarms code was developed and used to conduct several stealthy attack techniques to suppress or hinder alarms by exploiting code vulnerabilities. A novel ladder logic solution that consists of countermeasures against the introduced attacks was proposed, demonstrated, and tested. The countermeasure techniques, such as scan time and heartbeat techniques, were able to detect and prevent the code vulnerabilities and other abnormalities. The provided countermeasure techniques in this experiment could be applied to any PLC to enhance the validity and security of its PLC alarms code.
Article Highlights
Four stealthy attack models were introduced to exploit PLC alarms code. They were embedded to skip, delete, fake out, or delay alerting alarms.
Real-time countermeasure solutions with different techniques were introduced: scan time code, heartbeat code, and physical plausibility check. They effectively detected and prevented the introduced attack models.
PLC alarms Code general abnormalities was validated and detected using scan time techniques.
A list of general best code practices for PLC alarms code was introduced to mitigate code vulnerabilities.
Publisher
Springer Science and Business Media LLC
Subject
General Earth and Planetary Sciences,General Physics and Astronomy,General Engineering,General Environmental Science,General Materials Science,General Chemical Engineering
Reference34 articles.
1. Slay J, Miller M (2008) Lessons Learned from the Maroochy Water Breach. In: Goetz E., Shenoi S. (eds) Critical Infrastructure Protection. ICCIP 2007. IFIP International Federation for Information Processing, vol 253. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-75462-8_6
2. Sayfayn N, Madnick S (2017) “Cybersafety Analysis of the Maroochy Shire Sewage Spill,”. Available: https://web.mit.edu/smadnick/www/wp/2017-09.pdf. [Accessed January 22, 2022].
3. Ismail S, Sitnikova E, Slay J (2014). Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks.
4. Goel P, Datta A, Mannan M (2017) Industrial alarm systems: Challenges and opportunities. J Loss Prev Process Ind 50:23–36
5. Serhane A, Raad M, Raad R, Susilo W (2018) "PLC Code-Level Vulnerabilities," 2018 International Conference on Computer and Applications (ICCA), Beirut, pp. 348–352.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献