№12|2024

AUTOMATED AND INFORMATION MANAGEMENT SYSTEMS

UDC 004.056:628.1
DOI 10.35776/VST.2024.12.07

KINEBAS A. K., Киселёв А. Н., Платонов А. А.

Analysis of the technologies of cyber-attacks on the infrastructure of automated process control systems of water utilities with web-oriented malware

Summary

The results of analyzing the modern technologies of cyber-attacks on the infrastructure of automated process control systems of water utilities with web-oriented malware are presented. The technology of malware action using a fundamentally new approach to exploiting vulnerabilities in the web infrastructure of modern programmable logic controllers is considered in detail. Main scenarios of cyber-attacks on the infrastructure of automated process control systems of water utilities are considered. Practical recommendations are proposed focused on reducing the risks of cyber-attacks, increasing resistance to malicious actions and ensuring information security.

Key words

, , , ,

For citation: Kinebas A. K., Kiselev A. N., Platonov A. A. Analysis of the technologies of cyber-attacks on the infrastructure of automated process control systems of water utilities with web-oriented malware. Vodosnabzhenie i Sanitarnaia Tekhnika, 2024, no. 12, pp. 43–52. DOI: 10.35776/VST.2024.12.07. (In Russian).

The further text is accessible on a paid subscription.
For authorisation enter the login/password.
Or subscribe

REFERENCES

  1. Stouffer K., Lightman S., Pillitteri V., Abrams M., Hahn A. NIST special publication 800-82, revision 2: Guide to industrial control systems (ICS) security. National Institute of Standards and Technology, 2018.
  2. Garcia L., Zonouz S. A. Hey, my malware knows physics! attacking PLCs with physical model aware rootkit. Network and Distributed System Security (NDSS) Symp., 2017, pp. 1–15.
  3. Govil N., Agrawal A., Tippenhauer N. O. On ladder logic bombs in industrial control systems. Computer Security, 2017, pp. 110–126.
  4. Costin A., Zarras A., Francillon A. Automated dynamic firmware analysis at scale: a case study on embedded web interfaces. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016, pp. 437–448.
  5. Sasaki T., Fujita A., Ganan C. H., van Eeten M., Yoshioka K., Matsumoto T. Exposed infrastructures: Discovery, attacks and remediation of insecure ics remote management devices. IEEE Symposium on Security and Privacy (SP), 2022, pp. 2379–2396.
  6. Qasim S. A., Smith J. M., Ahmed I. Control logic forensics framework using built-in decompiler of engineering software in industrial control systems, Forensic Science International: Digital Investigation, 2020, v. 33, p. 301013.
  7. Salehi M., Bayat-Sarmadi S. PLCDefender: Improving remote attestation techniques for PLCs using physical model, IEEE Internet of Things Journal, 2021, v. 8, no. 9, pp. 7372–7379.
  8. McLaughlin S. E., Zonouz S. A., Pohly D. J., McDaniel P. D. A trusted safety verifier for process controller code. Network and Distributed System Security, 2014, v. 14.

Журнал ВСТ включен в новый перечень ВАК

Шлафман В. В. Проектирование под заданную ценность, или достижимая эффективность технических решений – что это?

Banner Kofman 1