Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2014, Vol. 54 Issue (1) : 29-34     DOI:
Orginal Article |
Security evaluation for industrial control devices
Feng XIE1(),Yong PENG1,Wei ZHAO1,Yang GAO1,Dejing WANG2,Xuefeng HAN1
1. China Information Technology Security Evaluation Center, Beijing 100085, China
2. University of International Relations, Beijing 100091, China
Download: PDF(1174 KB)   HTML
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks     Supporting Info
Guide   
Abstract  

Industrial control devices (ICDs) are widely used in many industrial facilities such as petrochemical factories, power generation plants, water treatment plants, and transportation systems. The cyber security of such devices directly affects industrial production, which affects our economic security as well as our national security. This paper describes common cyber security issues in these devices and the root causes of these issues. The effects of cyber attacks are also analyzed for attacks from the information space and the physical space connected to the ICDs. Finally, security evaluation techniques are given including standards, evaluation methods and certifications along with future research challenges.

Keywords industrial control devices (ICDs)      controller security issues      information space      physical space      security evaluation     
ZTFLH:     
Fund: 
Issue Date: 15 January 2014
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
Feng XIE
Yong PENG
Wei ZHAO
Yang GAO
Dejing WANG
Xuefeng HAN
Cite this article:   
Feng XIE,Yong PENG,Wei ZHAO, et al. Security evaluation for industrial control devices[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(1): 29-34.
URL:  
http://jst.tsinghuajournals.com/EN/     OR     http://jst.tsinghuajournals.com/EN/Y2014/V54/I1/29
  
  
攻击类型 对信息空间影响 对物理空间影响
A1
A2
A3
A4
  
类型 机构 对象 级别 评估内容 依据 说明
通信健壮性 自定义规范 支持TCP/IP, 覆盖链路层/网络层/传输层协议
EDSA ISA 设备 三级 功能安全 自定义规范 涵盖访问控制、使用控制、数据完整性、数据保密性、数据流限制、事件响应、可用性7类
软件开发安全 62443-4-1 涵盖软件开发的12个阶段
ACC Wurldtect 设备 二级 通信健壮性 逐渐与EDSA保持一致 支持TCP/IP, 覆盖链路层/网络层/传输层协议
APC Wurldtect 供应商 三级 实践过程 WIB 2.0 对过程进行评估
  
[1] Luders S. Stuxnet and the impact on accelerator control systems [C]// Proceedings of the 13th Conference on Accelerator and Large Experimental Physics Control Systems. Geneva, Switzerland: JACoW, 2011: 1285-1288.
[2] Kube N, Yoo K, Hoffman D. Automated testing of industrial control devices: The Delphi database [C]// Proceedings of 6th IEEE/ACM International Workshop on Automation of Software Test. New York, USA: Association for Computing Machinery Press, 2011: 71-76.
[3] 彭勇, 江常青, 谢丰, 等. 工业控制系统信息安全研究进展 [J]. 清华大学学报: 自然科学版, 2012, 52(10): 1396-1408. PENG Yong, JIANG Changqing, XIE Feng. Industrial control system cyber security research[J]. Journal of Tsinghua University: Science & Technology, 2012, 52(10): 1396-1408.
url: http://www.cnki.com.cn/Article/CJFDTotal-QHXB201210014.htm
[4] IEC62443. Security for Industrial Automation and Control Systems[S]. Geneva, Switzerland: International Electrotechnical Commission, 2010.
[5] ICS-CERT. Control system internet accessibility [Z/OL]. (2012-11-20), http://www.cs.unh.edu/~it666/reading_list/ Physical/cert_scada_shodan_alert.pdf.
[6] Florian S, MA Zhengdong, Thomas B, et al.A survey on threats and vulnerabilities in smart metering infrastructures[J]. International Journal of Smart Grid and Clean Energy, 2012, 1(1): 22-28.
[7] Sifferlin A. Wireless medical devices vulnerable to hacking [Z/OL]. (2013-04-22), http://www.toppatch.com/wp-content/uploads/2012/04/2012_Wireless-Medical-Devices-Vulnerable-to-Hacking-_-TIME.pdf.
[8] Radcliffe J. Hacking medical devices for fun and insulin: Breaking the human SCADA system [Z/OL]. (2013-04-30), http://cs.uno.edu/~dbilar/BH-US-2011/materials/Radcliffe/BH_US_11_Radcliffe_Hacking_Medical_Devices_WP.pdf.
[9] National Institute of Standards and Technology. Guide to Industrial Control Systems (ICS) Security[M]. Gaithersburg, USA: NIST, 2011.
[10] 王中杰, 谢璐璐. 信息物理融合系统研究综述[J]. 自动化学报, 2011, 37(10): 1157-1166. WANG Zhongjie, XIE lulu. Cyber-physical systems: A survey[J]. Acta Automatica Sinica, 2011, 37(10): 1157-1166.
url: http://www.cnki.com.cn/Article/CJFDTotal-MOTO201110001.htm
[11] Rajkumar R, Lee I, Lui S, et al.Cyber-physical systems: The next computing revolution [C]// Proceedings of 47th Conference on Design Automation Conference. Piscataway, USA: IEEE Press, 2010: 731-736.
[12] ANSI/ISA 99. Security forIndustrial Automation and Control Systems[S]. Research Triangle Park, USA: the International Society of Automation, 2007.
[13] International Instrument User's Association. Process control domain-security requirements for vendors [Z/OL]. (2013-05-22), http://osgug.ucaiug.org/conformity/security/Shared%20Documents/WIB%20M2784%20PCS%20Vendor Security%20v2.pdf.
[14] 吴世忠. 信息安全测评认证的十年求索[J]. 信息安全与保密通信, 2007, 1(6): 5-8. WU Shizhong. Decade research of testing, evaluation and certification of information security[J]. Information Security and Communications Privacy, 2007, 1(6): 5-8.
url: http://www.cnki.com.cn/Article/CJFDTotal-TXBM200706004.htm
[15] 冯登国. 信息安全测评理论与技术专辑前言[J]. 计算机学报, 2009, 32(4): 1-4. FENG Dengguo. The foreword of information security evaluation theory and techniques[J]. Chinese Journal of Computers, 2009, 32(4): 1-4.
[16] ISA Security Compliance Institute. ISA secure embedded device security assurance certification [Z/OL]. (2013-05-11), http://www.isa.org/filestore/asci/isci/ISCI%20ISASecure%20ECSA%20Certification%20brochure.pdf.
[17] Wurldtech Security Inc. Achilles practices certification [Z/OL]. (2013-03-15), http://www.wurldtech.com/product_services/certify_educate/achilles_practices_certification/.
[1] Kexin DENG. Retinal image registration based on hyper-edge graph matching[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 568-574.
[2] Chen HAO, Fu LI, Jiong GUO. Simulations of mixing in the pebble flow of a pebble bed HTR[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 624-628.
[3] Pengfei LIN, Xiaojian ZHANG, Chao CHEN, Jun WANG. Treatment of molybdenum-containing wastewater and drinking water[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 613-618.
[4] Qi MIN, Yuanyuan DUAN, Xiaodong WANG. Lattice Boltzmann method for the fluid saturation density based on the volume translated Peng-Robinson equation of state[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 619-623.
[5] Zhenbo WANG, Jun ZHANG, Yiming LUOSUN. Flexural performance of textile reinforced cementitious composite with sprinkling water hardening technique[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 551-555.
[6] Feng JIANG, Ziwei ZHUANG, Zhenzhong ZHANG, Jiying WEI. Evaporation-condensation technology for testing the efficiency of HEPA filter media[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 629-632.
[7] Xinrong CAO, Lei LIU, Dongyang CAI, Peng GUO, Jintian TANG. Statistical analyses of ballistocardiogram features for cardiac disease diagnosis[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 633-637.
[8] Wu XU, Qing YU, Guohuang YAO. Effect of preload on the axial capacity of CFST reinforced concrete columns[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 556-562.
[9] Ya WEI, Xiangjie YAO. Tensile creep model for concrete subject to constant restraints[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 563-567.
[10] Ronghua LIU, Jiahua WEI, Yanzhang WENG, Guangqian WANG, Shuang TANG. HydroMP: A cloud computing based platform for hydraulic modeling and simulation service[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 575-583.
[11] Na ZHAO, Zhaoyin WANG, Baozhu PAN, Zhiwei LI, Xuehua DUAN. Ecological functions of riverbed structures with different strengths in the Xiaojiang River basin[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 584-589.
[12] Hanbo YANG, Huafang LV, Qingfang HU, Huimin LEI, Dawen YANG. Comparison of parametrization methods for calculating the downward long-wave radiation over the North China Plain[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 590-595.
[13] Fenjie LONG, Zhenxing LONG, Xiaomeng WANG. Effect of equity constraints on housing prices in rising markets[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 596-601.
[14] Hong ZHANG, Yang ZHANG, Xuanbing CHEN. Experimental evaluation of Beijing resale housing information diffusion during information transmission[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 602-606.
[15] Hongwei YANG, Haoyu WANG, Yunxia LIU, Wenjun LIU, Shaoxia YANG. Ozone-biological activated carbon treatment of DBP in high-bromide water[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(5): 607-612.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd