A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics

Author:

Wang Zibo12,Zhang Yaofang12,Chen Yilu1,Liu Hongri13,Wang Bailing12,Wang Chonghua4

Affiliation:

1. School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209, China

2. School of Cyberspace Science, Harbin Institute of Technology, Harbin 150001, China

3. Weihai Cyberguard Technologies Co., Ltd., Weihai 264209, China

4. China Industrial Control Systems Cyber Emergency Response Team, Beijing 100040, China

Abstract

Programmable Logic Controllers (PLCs), as specialized task-oriented embedded field devices, play a vital role in current industrial control systems (ICSs), which are composed of critical infrastructure. In order to meet increasing demands on cost-effectiveness while improving production efficiency, commercial-off-the-shelf software and hardware, and external networks such as the Internet, are integrated into the PLC-based control systems. However, it also provides opportunities for adversaries to launch malicious, targeted, and sophisticated cyberattacks. To that end, there is an urgent need to summarize ongoing work in PLC-based control systems on vulnerabilities, attacks, and security detection schemes for researchers and practitioners. Although surveys on similar topics exist, they are less involved in three key aspects, as follows: First and foremost, previous work focused more on system-level vulnerability analysis than PLC itself. Subsequently, it was not clear whether their work applied to the current systems or future ones, especially for security detection schemes. Finally, the prior surveys lacked a digital forensic research review of PLC-based control systems, which was significant for security analysis at different stages. As a result, we highlight vulnerability analysis at both a core component level and a system level, as well as attack models against availability, integrity, and confidentiality. Meanwhile, reviews of security detection schemes and digital forensic research for the current PLC-based systems are provided. Finally, we discuss future work for the next-generation systems.

Funder

National Key R&D Program of China

Publisher

MDPI AG

Subject

Process Chemistry and Technology,Chemical Engineering (miscellaneous),Bioengineering

Reference114 articles.

1. W32. stuxnet dossier;Falliere;White Pap. Symantec Corp. Secur. Response,2011

2. The 2015 ukraine blackout: Implications for false data injection attacks;Liang;IEEE Trans. Power Syst.,2016

3. Ransomware detection and mitigation using software-defined networking: The case of WannaCry;Akbanov;Comput. Electr. Eng.,2019

4. Di Pinto, A., Dragoni, Y., and Carcano, A. (2018, January 4–9). TRITON: The first ICS cyber attack on safety instrument systems. Proceedings of the Black Hat USA 2018, Las Vegas, NV, USA.

5. Programmable logic controller forensics;Ahmed;IEEE Secur. Priv.,2017

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3