Method of control of the state of protection of the automated process control system of the critical infrastructure facility

Authors

  • Serhii Vasylenko Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kiev Polytechnic Institute”, Kyiv, Ukraine https://orcid.org/0000-0001-6779-8246
  • Igor Samoilov Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv, Ukraine https://orcid.org/0000-0002-8251-9257
  • Serhii Burian Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv, Ukraine https://orcid.org/0000-0001-7383-571X

DOI:

https://doi.org/10.20535/2411-1031.2022.10.1.261047

Keywords:

critical infrastructure facility, automated process control system, industrial Internet of things, security management, dynamic programming

Abstract

Constant dynamic processes of society informatization drastically change all spheres of its life, giving them new impulses and opportunities for implementation in the new conditions. At the same time, these processes are the cause of fundamentally new challenges for the security sector, which cause the deep penetration of information technology into all elements of infrastructure, including critical ones. Cyberattacks on critical information infrastructure facility of critical infrastructure facility (CIIF CIF) are particularly dangerous. Much of the CIIF CIF cyberthreats are related to the massive implementation of Industry 4.0 (I 4.0) technologies such as digital ecosystems, the Industrial Internet of Things (IIoT), big data analytics, the use of digital platforms, etc. The risks associated with these require new solutions in the management of the CIIF CIF conservation status. In the work as CIIF CIF considered the automated process control system (APCS) CIF built with IIoT-sensors usage. The peculiarities of building such systems and the need for rapid response to any cyberincidents require automation of the management of decision-making process for the application of the necessary protection means. For the state of protection against cyberattacks on APCS CIF it is proposed to use the method of making management decisions based on a dynamic programming, depending on the type of cyberattack control, selection and application of appropriate means of protection and to reduce the consequences of cyberincidents.

Author Biographies

Serhii Vasylenko, Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kiev Polytechnic Institute”, Kyiv

candidate of technical sciences, head at the research laboratory of the scientific and research center

Igor Samoilov, Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv

candidate of technical sciences, associate professor, associate professor at the state information resources security academic department

Serhii Burian, Institute of special communications and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Kyiv

senior lecturer at the state information resources security academic department

References

O. M. Sukhodolia, “Zakhyst krytychnoi infrastruktury v umovakh hibrydnoi viiny: problemy ta priorytety derzhavnoi polityky Ukrainy”, Strategic priorities, vol. 3, pp. 62-76, 2016. [Online]. Avaliable: http://nbuv.gov.ua/UJRN/spa_2016_3_10. Accessed on: Jan. 15, 2022.

O. V. Potii, A. V. Lienshyn, “Doslidzhennia metodiv otsinky ryzykiv bezpetsi informatsii ta rozrobka propozytsii z yikh vdoskonalennia na osnovi systemnoho pidkhodu”, Collection of scientific works of Kharkiv University of Air Sy, vol. 2 (24), pp. 85-91, 2010.

ICS vulnerability discoveries soar by 110% in four years. [Online]. Avaliable: https://drivesncontrols.com/news/fullstory.php/aid/6971/ICS_vulnerability_discoveries_soar_by_110_25_in_four_years.html. Accessed on: Oct. 17, 2021.

D. Dubov, “Kiberfront. Yak RF atakuie Ukrainu ta chy hotovi my zakhyshchatysia”. [Online]. Avaliable: https://biz.nv.ua/ukr/experts/kiberataki-rosiji-na-ukrajinu-yak-prohodyat-ta-chim-zagrozhuyut-ostanni-novini-50236927.html. Accessed on: Jan. 17, 2022.

A. Djenna, S. Harous, and D. E. Saidouni, “Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure”, Applied Scienses, no. 11, 4580. pp. 1-30, 2021. [Online]. Avaliable: https://www.researchgate.net/publication/351652228_Internet_of_Things_Meet_Internet_of_Threats_New_Concern_Cyber_Security_Issues_of_Critical_Cyber_Infrastructure. Accessed on: Dec. 22, 2021.

K. Kobara, “Cyber Physical Security for Industrial Control Systems and IoT” 790 IEICE TRANS. INF. & SYST., vol. E99–D, no. 4 pp. 787-795, April 2016. [Online]. Avaliable: https://www.researchgate.net/publication/299542268_Cyber_Physical_Security_for_Industrial_Control_Systems_and_IoT. Accessed on: Nov. 22, 2021.

Ionut Arghire Critical Vulnerabilities Found in Sealevel Device Used in ICS Environments. [Online]. Avaliable: https://www.securityweek.com/critical-vulnerabilities-found-sealevel-device-used-ics-environments. Accessed on: Jan. 12, 2022.

Pry APT-atakakh BlackEnergy na Ukrayne prymenialsia tselevoi fyshynh s Word-dokumentamy, Kaspersky Lab’s Global Research & Analysis Team. [Online]. Avaliable: https://securelist.ru/blog/issledovaniya/27903/pri-apt-atakax-blackenergy-v‑ukraine-primenyalsya-celevoj-fishings-ispolzovaniem-worddokumentov Accessed on: Febr. 01, 2022.

Zero Days. The Internet Movie Database. [Online]. Avaliable: http://www.imdb.com/ title/tt5446858. Accessed on: Jan. 9, 2022.

A. Panasenko, “Khakery nechaianno atakovaly vodoochystnye sooruzhenyia”, Anti-Malware. [Online]. Avaliable: https://www.anti-malware.ru/news/2016-03-24/18450. Accessed on: Jan. 27, 2022.

T. Spring, “Zlovred, zatochenyi pod ASU TP, ukral idei u Stuxnet. Threatpost”. [Online]. Avaliable: https://threatpost.ru/irongate-ics-malware-steals-from-stuxnet-playbook/16544. Accessed on: Febr. 02, 2022.

Bazovi rekomendatsii z kiberbezpeky promyslovykh system upravlinnia dlia viddiliv ASU TP (August 2017), TK 185 “Promyslova avtomatyzatsiia”. Hrupa “kiber-bezpeka v ASU TP”.

A. S. Rymsha, and K. S. Rymsha, “Analyz sredstv obespechenyia ynformatsyonnoi bezopasnosty ASU TP hazodobuvaiushchykh predpryiatyi”, CASPIAN JOURNAL: Control and High Technologies, no. 3 (47), pp. 102-121, 2019.

A. S. Storchak, and S. V. Salnyk, “Metod otsiniuvannia rivnia zakhyshchenosti merezhevoi chastyny komunikatsiinoi systemy spetsialnoho pryznachennia vid kiberzahroz”, Information processing systems, no. 3 (158), pp. 98-109, 2019. doi: https://doi.org/10.30748/soi.2019.158.12.

A. S. Storchak, “Metod otsinky zakhyshchenosti informatsii na osnovi bahatokrokovykh protsesiv pryiniattia rishen”, Skhidno-Yevropeiskyi zhurnal peredovykh tekhnolohii. Fizyko-tekhnolohichni problemy radiotekhnichnykh prystroiv, zasobiv telekomunikatsii, nano- i mikroelektronik, no. 2 (66), pp. 82-85, 2013.

Published

2022-06-30

How to Cite

Vasylenko, S., Samoilov, I., & Burian, S. (2022). Method of control of the state of protection of the automated process control system of the critical infrastructure facility. Collection "Information Technology and Security", 10(1), 17–26. https://doi.org/10.20535/2411-1031.2022.10.1.261047

Issue

Section

INFORMATION SECURITY