Affiliation:
1. School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209, China
2. School of Cyberspace Science, Harbin Institute of Technology, Harbin 150001, China
3. Weihai Cyberguard Technologies Co., Ltd., Weihai 264209, China
4. China Industrial Control Systems Cyber Emergency Response Team, Beijing 100040, China
Abstract
Programmable Logic Controllers (PLCs), as specialized task-oriented embedded field devices, play a vital role in current industrial control systems (ICSs), which are composed of critical infrastructure. In order to meet increasing demands on cost-effectiveness while improving production efficiency, commercial-off-the-shelf software and hardware, and external networks such as the Internet, are integrated into the PLC-based control systems. However, it also provides opportunities for adversaries to launch malicious, targeted, and sophisticated cyberattacks. To that end, there is an urgent need to summarize ongoing work in PLC-based control systems on vulnerabilities, attacks, and security detection schemes for researchers and practitioners. Although surveys on similar topics exist, they are less involved in three key aspects, as follows: First and foremost, previous work focused more on system-level vulnerability analysis than PLC itself. Subsequently, it was not clear whether their work applied to the current systems or future ones, especially for security detection schemes. Finally, the prior surveys lacked a digital forensic research review of PLC-based control systems, which was significant for security analysis at different stages. As a result, we highlight vulnerability analysis at both a core component level and a system level, as well as attack models against availability, integrity, and confidentiality. Meanwhile, reviews of security detection schemes and digital forensic research for the current PLC-based systems are provided. Finally, we discuss future work for the next-generation systems.
Funder
National Key R&D Program of China
Subject
Process Chemistry and Technology,Chemical Engineering (miscellaneous),Bioengineering
Reference114 articles.
1. W32. stuxnet dossier;Falliere;White Pap. Symantec Corp. Secur. Response,2011
2. The 2015 ukraine blackout: Implications for false data injection attacks;Liang;IEEE Trans. Power Syst.,2016
3. Ransomware detection and mitigation using software-defined networking: The case of WannaCry;Akbanov;Comput. Electr. Eng.,2019
4. Di Pinto, A., Dragoni, Y., and Carcano, A. (2018, January 4–9). TRITON: The first ICS cyber attack on safety instrument systems. Proceedings of the Black Hat USA 2018, Las Vegas, NV, USA.
5. Programmable logic controller forensics;Ahmed;IEEE Secur. Priv.,2017
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献