Abstract
In smart cities, the networked control system plays a significant role in transportation systems, power stations or other critical infrastructures, and it is facing many security issues. From this point, this paper proposes a content-based deep communication control approach to guarantee its security. Based on the layer architecture, this approach analyzes the interactive content in depth according to different industrial communication protocols, and implements the access control between two distinct enclaves. For OPC Classic, we acquire the dynamic port provided by OPC server, and open a new connection belonging to this port; for Modbus/TCP, we not only analyze the ordinary function codes and addresses, but also check the register or coil values by using the multi-bit Trie-tree matching algorithm. Besides, the white-listing strategy is introduced to satisfy the special requirements of industrial communication. Our experiment results show that, on the one hand the proposed approach provides OPC and Modbus/TCP defenses in depth; on the other hand it has less than 1 ms forwarding latency and 0 packet loss rate when the rule number reaches 200, and all these meet the availability requirements in the networked control system. In particular, this approach has been successfully applied in several real-world petrochemical control systems.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Gupta, R. A., & Chow, M. Y. (2010). Networked control system: Overview and research trends. IEEE Transactions on Industrial Electronics, 57(7), 2527–2535.
Kagermann, H., Wahlster, W., & Helbig, J. (2014). Recommendations for implementing the strategic initiative INDUSTRIE 4.0. Final Report. http://wwwplattform-i40.de/finalreport2013.
Genge, B., Siaterlis, C., Fovino, I. N., & Masera, M. (2012). A cyber-physical experimentation environment for the security analysis of networked industrial control systems. Computer and Electrical Engineering, 38(5), 1146–1161.
Zhang, H., Cheng, P., Shi, L., & Chen, J. (2016). Optimal DoS attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology, 24(3), 843–852.
Lin, S., & Wu, H. (2015). Bloom filter-based secure data forwarding in large ccale cyber-physical systems. Mathematical Problems in Engineering, 2015(1), 1–10.
ICS-CERT. (2015). ICS-CERT year in review 2014. https://ics-cert.us-cert.gov/sites/default/files/Annual_Reports/Year_in_Review_FY2014_Final.
Nourian, A., & Madnick, S. (2015). A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet. IEEE Transactions on Dependable and Secure Computing, 99, 1–20.
Hadziosmanovic, D., Bolzoni, D., Etalle, S., & Hartel, P. (2012). Challenges and opportunities in securing industrial control systems. Proceedings of 2012 Complexity in Engineering (COMPENG12) (pp. 1–6).
Davis, K. R., Davis, C. M., Zonouz, S. A., Bobba, R. B., Berthier, R., Garcia, L., et al. (2015). A cyber-physical modeling and assessment framework for power grid infrastructures. IEEE Transactions on Smart Grid, 6(5), 2464–2475.
Yeole, A. S., & Meshram, B. B. (2011). Analysis of different technique for detection of SQL injection. Proceedings of 2011 International Conference & Workshop on Emerging Trends in Technology (ICWET11) (pp. 963–966).
Stouffer, K., Falco, J., & Scarfone, K. (2011). Guide to industrial control systems (ics) security. National Institute of Standards and Technology (NIST), US Department of Commerce, Technical Report NIST Special Publication (pp. 800–82). http://csrc.nist.gov/publications/nistpubs/800-82/SP800-82-final.
Papp, D., Ma, Z., & Buttyan, L. (2015). Embedded systems security: threats, vulnerabilities, and attack taxonomy. Proceedings of 2015 13th Annual Conference on Privacy, Security and Trust (PST15) (pp. 145–152).
Beresford, D. (2011). Exploiting siemens simatic S7 PLCs. https://media.blackhat.com/bh-us-11/Beresford/BH US11 BeresfordS7 PLCs WP.
Darias, Z., Serhrouchni, A., & Vogel, O. (2015). Taxonomy of attacks on industrial controls protocols. Proceedings of 2015 International Conference on Protocol Engineering (ICPE15) and New Technologies of Distributed Systems (NTDS15) (pp. 1–6).
Zhao, W., Xie, F., Peng, Y., & Gao, Y. (2013). Security testing methods and techniques of industrial control devices. Proceedings of 2013 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP13) (pp. 433–436).
Voyiatzis, A. G., Katsigiannis, K., & Koubias, S. (2015). A Modbus/TCP fuzzer for testing internetworked industrial systems. Proceedings of 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA15) (pp. 1–6).
Igure, V. M., Laughter, S. A., & Williams, R. D. (2006). Security issues in SCADA networks. Computers and Security, 25(7), 498–506.
Cereia, M., Bertolotti, I. C., Durante, L., & Valenzano, A. (2014). Latency evaluation of a firewall for industrial networks based on the Tofino industrial security solution. Proceedings of 2014 IEEE Emerging Technology and Factory Automation (ETFA14) (pp. 1–8).
Zhang, S. S., Shang, W. L., Wan, M., Zhang, H., & Zeng, P. (2014). Security defense module of Modbus TCP communication based on region/enclave rules. Computer Engineering and Design, 35(11), 3701–3707.
Krotofil, M., & Gollmann, D. (2013). Industrial control systems security: what is happening? Proceedings of 2013 11th IEEE International Conference on Industrial Informatics (INDIN13) (pp. 670–675).
Tan, V. V., Yoo, D. S., & Yi, M. J. (2007). Security in automation and control systems based on OPC techniques. Proceedings of 2007 International Forum on Strategic Technology (IFOST07) (pp. 136–140).
Schwarz, M. H., & Borcsok J. (2013). A survey on OPC and OPC-UA: about the standard, developments and investigations. Proceedings of 2013 XXIV International Symposium on Information, Communication and Automation Technologies (ICAT13) (pp. 1–6).
OPC Foundation. (2000). The OPC security custom interface specification. http://opcfoundation.org/.
Wan, M., Shang, W. L., Zeng, P., & Zhao, J. M. (2016). Modbus/TCP communication control method based on deep function code inspection. Information and Control, 45(2), 248–256.
Shang, F. J., Pan, Y. J., Pan, X. Z., & Bin, B. (2008). Research on a stochastic distribution multibit Trie tree IP classification algorithm. Journal on Communications, 29(7), 109–117.
Jiang, W., & Prasanna, V. K. (2013). Data structure optimization for power-efficient IP lookup architectures. IEEE Transactions on Computers, 62(11), 2169–2182.
Pothamsetty, V., & Franz, M. (2004). Transparent Modbus/TCP filtering with Linux. http://modbusfw.sourceforge.net/.
Igor, N. F., Alessio, C., Andrea, C., & Masera, M. (2012). Critical state-based filtering system for securing SCADA network protocols. IEEE Transactions on Industrial Eletronics, 59(10), 3943–3950.
GB/T 20281-2006. (2006). Information security technology-technique requirements and testing and evaluation approaches for firewall products. National Standard of the People’s Republic of China. http://www.spc.org.cn/gb168/.
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Grant Nos. 61501447, 61502474) and Independent project of Key Laboratory of Networked Control System Chinese Academy of Sciences: Research on abnormal behavior modeling, online intrusion detection and self-learning method in industrial control network. The authors are grateful to the anonymous referees for their insightful comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wan, M., Shang, W., Kong, L. et al. Content-based deep communication control for networked control system. Telecommun Syst 65, 155–168 (2017). https://doi.org/10.1007/s11235-016-0223-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-016-0223-x