A security study for Control Network: Security Threat Using Control Protocol
Unlike a general IT environment, an industrial control system is an environment where stability and continuity are more important than security. In the event of a security accident in the industrial control system, physical motion can be controlled, so physical damage can occur and physical damage can even result in personal injury. Cyber attacks on industrial control systems are not simply cyber damage, but terrorism. However, the security of industrial control systems has not been strengthened yet, and many vulnerabilities are actually occurring. This paper shows that the PLC can be remotely controlled by analyzing the connection process and packets for the PLC protocol used in the industrial control system and bypassing the security mechanism existing in the protocol. Through this, we intend to raise the security awareness of the industrial control system.
Aura, T., “Strategies against replay attacks,” In Proceedings of the 10th IEEE Computer Society Foundations Workshop, Rockport, MA, IEEE Computer Society Press, pp. 59-68, 1997.
Denning, D. and Sacco, G., “Timestamps in key distribution protocols,” Communications of the ACM, Vol. 24, No. 8, pp. 553-536, 1981.
FA Journal, “Siemens wins with TIA Portal,” 2013.
Gong, L. and Syverson, P., “Fail-stop protocols: An approach to designing secure protocols,” In 5th International Working Conference on Dependable Computing for Critical Applications, pp. 44-55, 1995.
Jung, I. K., “A Development Method of Web System Combining Service Oriented Architecture with Multi-Software Product Line,” The Journal of Society for e-Business Studies, Vol. 24, No. 3, pp. 53-71, 2019.
Kim, J. Y., “Understanding and importance of industrial control system security,” SK Infosec Official Blog, 2016.
Kwon, J. W. and Park, J. H., “The new paradigm of malware, Stuxnet,” AhnLab Special Report 3, 2010.
Lee, J. H. and Kim, U.-N., “Standard Introduction-Industrial Control System Security Requirements,” TTA Journal, Serial No. 173, pp. 62-66, 2017.
Lei, C.., Donghong, L.., and Liang, M., “The spear to break the security wall of S7 CommPlus,” BlackHat.
Malladi, S., Alves-Foss, J., and Heckendorn, R. B., “On Preventing Replay Attacks on Security Protocols,” Proc. International Conference on Security and Management, 2002.
Monn, G. Y., “Stuxnet’s Resurrection? Iran claims Israel has attacked,” security news, 2018.
Na, J. H., “Safe firmware update of ITU-T SG17 industrial control system,” TTA ICT Standard Weekly, 2016.
Sohn, J. M., Lee, I. T., and Lim, H. C., “Enhancement of Industrial Control Systems(ICS) Security for Service Company,” The Korea Service Management Society, Vol. 20, No. 4, pp. 183-200, 2019.
Spenneberg, R., Brüggemann, M., and Schwartke, H., “PLC-blaster: a worm living solely in the PLC,” in: Black Hat Asia 2016, Singapore, p. 16, 2016.
Syverson., P., “A taxonomy of replay attacks,” In Proceedings of the Computer Security Foundations Workshop(CSFW97), pp. 187-191, 1994.
Wire Shark Wiki, https://wiki.wireshark. org/S7comm.
Xu, Y., Yang, Y., Li, T., Ju, J., and Wang, Q., “Review on cyber vulnerabilities of communication protocols in industrial control systems,” 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, pp. 1-6, 2017.
- There are currently no refbacks.