Bonney et al., 2015 - Google Patents
ICS/SCADA security analysis of a Beckhoff CX5020 PLCBonney et al., 2015
View PDF- Document ID
- 9641499532353592412
- Author
- Bonney G
- Höfken H
- Paffen B
- Schuba M
- Publication year
- Publication venue
- 2015 International Conference on Information Systems Security and Privacy (ICISSP)
External Links
Snippet
A secure and reliable critical infrastructure is a concern of industry and governments. SCADA systems (Supervisory Control and Data Acquisition) are a subgroup of ICS (Industrial Control Systems) and known to be well interconnected with other networks. It is …
- 238000004458 analytical method 0 title description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/40—Bus networks
- H04L2012/40208—Bus networks characterized by the use of a particular bus standard
- H04L2012/40215—Controller Area Network CAN
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS], computer integrated manufacturing [CIM]
- G05B19/4185—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS], computer integrated manufacturing [CIM] characterised by the network communication
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/05—Programmable logic controllers, e.g. simulating logic interconnections of signals according to ladder diagrams or function charts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/40—Bus networks
- H04L2012/4026—Bus for use in automation systems
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/25—Pc structure of the system
- G05B2219/25428—Field device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
- G05B19/0423—Input/output
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/40—Bus networks
- H04L2012/40208—Bus networks characterized by the use of a particular bus standard
- H04L2012/40254—Actuator Sensor Interface ASI
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Buza et al. | CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot | |
| CN101283539B (en) | network security device | |
| US10348763B2 (en) | Responsive deception mechanisms | |
| Kuipers et al. | Control systems cyber security: Defense in depth strategies | |
| Rodofile et al. | Extending the cyber-attack landscape for SCADA-based critical infrastructure | |
| Rosa et al. | A comprehensive security analysis of a SCADA protocol: From OSINT to mitigation | |
| Hui et al. | Investigating current plc security issues regarding siemens s7 communications and TIA portal | |
| Bonney et al. | ICS/SCADA security analysis of a Beckhoff CX5020 PLC | |
| JP2008541205A (en) | Device for secure remote access | |
| Langill | Defending against the dragonfly cyber security attacks | |
| Abe et al. | Security threats of Internet-reachable ICS | |
| Antrobus et al. | The forgotten I in IIoT: A vulnerability scanner for industrial Internet of Things | |
| CN114402567A (en) | Online detection of algorithmically generated domains | |
| Pfrang et al. | Detecting and preventing replay attacks in industrial automation networks operated with profinet IO | |
| Lüders | Control systems under attack? | |
| Kant et al. | Investigation of risks for critical infrastructures due to the exposure of SCADA systems and industrial controls on the Internet based on the search engine Shodan | |
| Bonney et al. | ICS/SCADA Security | |
| Zhang | An implementation of scada network security testbed | |
| Knudsen et al. | Security in the Industrial Internet of Things | |
| Khondoker et al. | Addressing industry 4.0 security by software-defined networking | |
| Johnson et al. | Forensic attacks analysis and the cyber security of safety-critical industrial control systems | |
| Mees et al. | Cursus Secure Industrial Networks | |
| Hagman et al. | Cyber security measures in protection and control IEDs | |
| Kloiber et al. | Test-beds and guidelines for securing IoT products and for | |
| Bengs | Enhancement of Cyber Security in Substation Projects |