Method of control of the state of protection of the automated process control system of the critical infrastructure facility
DOI:
https://doi.org/10.20535/2411-1031.2022.10.1.261047Keywords:
critical infrastructure facility, automated process control system, industrial Internet of things, security management, dynamic programmingAbstract
Constant dynamic processes of society informatization drastically change all spheres of its life, giving them new impulses and opportunities for implementation in the new conditions. At the same time, these processes are the cause of fundamentally new challenges for the security sector, which cause the deep penetration of information technology into all elements of infrastructure, including critical ones. Cyberattacks on critical information infrastructure facility of critical infrastructure facility (CIIF CIF) are particularly dangerous. Much of the CIIF CIF cyberthreats are related to the massive implementation of Industry 4.0 (I 4.0) technologies such as digital ecosystems, the Industrial Internet of Things (IIoT), big data analytics, the use of digital platforms, etc. The risks associated with these require new solutions in the management of the CIIF CIF conservation status. In the work as CIIF CIF considered the automated process control system (APCS) CIF built with IIoT-sensors usage. The peculiarities of building such systems and the need for rapid response to any cyberincidents require automation of the management of decision-making process for the application of the necessary protection means. For the state of protection against cyberattacks on APCS CIF it is proposed to use the method of making management decisions based on a dynamic programming, depending on the type of cyberattack control, selection and application of appropriate means of protection and to reduce the consequences of cyberincidents.
References
O. M. Sukhodolia, “Zakhyst krytychnoi infrastruktury v umovakh hibrydnoi viiny: problemy ta priorytety derzhavnoi polityky Ukrainy”, Strategic priorities, vol. 3, pp. 62-76, 2016. [Online]. Avaliable: http://nbuv.gov.ua/UJRN/spa_2016_3_10. Accessed on: Jan. 15, 2022.
O. V. Potii, A. V. Lienshyn, “Doslidzhennia metodiv otsinky ryzykiv bezpetsi informatsii ta rozrobka propozytsii z yikh vdoskonalennia na osnovi systemnoho pidkhodu”, Collection of scientific works of Kharkiv University of Air Sy, vol. 2 (24), pp. 85-91, 2010.
ICS vulnerability discoveries soar by 110% in four years. [Online]. Avaliable: https://drivesncontrols.com/news/fullstory.php/aid/6971/ICS_vulnerability_discoveries_soar_by_110_25_in_four_years.html. Accessed on: Oct. 17, 2021.
D. Dubov, “Kiberfront. Yak RF atakuie Ukrainu ta chy hotovi my zakhyshchatysia”. [Online]. Avaliable: https://biz.nv.ua/ukr/experts/kiberataki-rosiji-na-ukrajinu-yak-prohodyat-ta-chim-zagrozhuyut-ostanni-novini-50236927.html. Accessed on: Jan. 17, 2022.
A. Djenna, S. Harous, and D. E. Saidouni, “Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure”, Applied Scienses, no. 11, 4580. pp. 1-30, 2021. [Online]. Avaliable: https://www.researchgate.net/publication/351652228_Internet_of_Things_Meet_Internet_of_Threats_New_Concern_Cyber_Security_Issues_of_Critical_Cyber_Infrastructure. Accessed on: Dec. 22, 2021.
K. Kobara, “Cyber Physical Security for Industrial Control Systems and IoT” 790 IEICE TRANS. INF. & SYST., vol. E99–D, no. 4 pp. 787-795, April 2016. [Online]. Avaliable: https://www.researchgate.net/publication/299542268_Cyber_Physical_Security_for_Industrial_Control_Systems_and_IoT. Accessed on: Nov. 22, 2021.
Ionut Arghire Critical Vulnerabilities Found in Sealevel Device Used in ICS Environments. [Online]. Avaliable: https://www.securityweek.com/critical-vulnerabilities-found-sealevel-device-used-ics-environments. Accessed on: Jan. 12, 2022.
Pry APT-atakakh BlackEnergy na Ukrayne prymenialsia tselevoi fyshynh s Word-dokumentamy, Kaspersky Lab’s Global Research & Analysis Team. [Online]. Avaliable: https://securelist.ru/blog/issledovaniya/27903/pri-apt-atakax-blackenergy-v‑ukraine-primenyalsya-celevoj-fishings-ispolzovaniem-worddokumentov Accessed on: Febr. 01, 2022.
Zero Days. The Internet Movie Database. [Online]. Avaliable: http://www.imdb.com/ title/tt5446858. Accessed on: Jan. 9, 2022.
A. Panasenko, “Khakery nechaianno atakovaly vodoochystnye sooruzhenyia”, Anti-Malware. [Online]. Avaliable: https://www.anti-malware.ru/news/2016-03-24/18450. Accessed on: Jan. 27, 2022.
T. Spring, “Zlovred, zatochenyi pod ASU TP, ukral idei u Stuxnet. Threatpost”. [Online]. Avaliable: https://threatpost.ru/irongate-ics-malware-steals-from-stuxnet-playbook/16544. Accessed on: Febr. 02, 2022.
Bazovi rekomendatsii z kiberbezpeky promyslovykh system upravlinnia dlia viddiliv ASU TP (August 2017), TK 185 “Promyslova avtomatyzatsiia”. Hrupa “kiber-bezpeka v ASU TP”.
A. S. Rymsha, and K. S. Rymsha, “Analyz sredstv obespechenyia ynformatsyonnoi bezopasnosty ASU TP hazodobuvaiushchykh predpryiatyi”, CASPIAN JOURNAL: Control and High Technologies, no. 3 (47), pp. 102-121, 2019.
A. S. Storchak, and S. V. Salnyk, “Metod otsiniuvannia rivnia zakhyshchenosti merezhevoi chastyny komunikatsiinoi systemy spetsialnoho pryznachennia vid kiberzahroz”, Information processing systems, no. 3 (158), pp. 98-109, 2019. doi: https://doi.org/10.30748/soi.2019.158.12.
A. S. Storchak, “Metod otsinky zakhyshchenosti informatsii na osnovi bahatokrokovykh protsesiv pryiniattia rishen”, Skhidno-Yevropeiskyi zhurnal peredovykh tekhnolohii. Fizyko-tekhnolohichni problemy radiotekhnichnykh prystroiv, zasobiv telekomunikatsii, nano- i mikroelektronik, no. 2 (66), pp. 82-85, 2013.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Collection "Information Technology and Security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).