2016
DOI: 10.1007/s11235-016-0223-x
|View full text |Cite
|
Sign up to set email alerts
|

Content-based deep communication control for networked control system

Abstract: In smart cities, the networked control system plays a significant role in transportation systems, power stations or other critical infrastructures, and it is facing many security issues. From this point, this paper proposes a content-based deep communication control approach to guarantee its security. Based on the layer architecture, this approach analyzes the interactive content in depth according to different industrial communication protocols, and implements the access control between two distinct enclaves.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3

Relationship

5
1

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 21 publications
0
12
0
Order By: Relevance
“…Furthermore, we use Libpcap mechanism to capture the packets, and parse all Modbus/TCP packets in depth by using our own Linux C program. In this program, we perform the packet analysis layer by layer to obtain function codes, addresses and values according to Modbus/TCP protocol specification [17]. In particular, the whole capture time is about one hour 40 minutes, and the number of captured Modbus/TCP packets is 46,485.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, we use Libpcap mechanism to capture the packets, and parse all Modbus/TCP packets in depth by using our own Linux C program. In this program, we perform the packet analysis layer by layer to obtain function codes, addresses and values according to Modbus/TCP protocol specification [17]. In particular, the whole capture time is about one hour 40 minutes, and the number of captured Modbus/TCP packets is 46,485.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…In fact, the main reasons for the vulnerabilities of networked control systems can be summarized in two aspects: from the perspective of their internal architectures, because the industrial-oriented communication protocols, real-time operating systems or embedded hardware/software platforms lack the applicable security mechanisms, the attackers can easily perform the destructive operations by exploiting the intrinsic system weaknesses [14], [15]; from the perspective of the external network environment, because the communication mechanism has developed into the IP-based communication pattern, the traditional IT threats can uncontrollably infiltrate into industrial control networks and cause significant damage [6], [16]. As a result, both academia and industry are now developing security solutions serving specially in networked control systems, and these solutions generally relate to threat prevention [17], [18], vulnerability evaluation [19], [20] and intrusion detection [13], [21]. As a bypass approach to detect misbehaviors without disrupting the availability and real-time performance of networked control systems, intrusion detection has been attracting great interests of researchers.…”
Section: Introductionmentioning
confidence: 99%
“…In the device-oriented cases, trusted computing for industrial embedded devices [16] is a burgeoning security technology to provide system integrity check and data confidentiality protection. In the network-oriented cases, industrial firewall [11,17] and intrusion detection [15,18,19] are the typical applications in industrial control networks to improve the communication security. However, because we have not understood the boundary conditions between the availability and security of industrial control systems, the cases on trusted computing and industrial firewall may result in the processing delay or transmission delay in industrial process automation.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…Moreover, we suppose that these malicious Modus/TCP packets cannot contain other function codes which are different with the four categories of function codes used in the simulation control system, and these packets only change the function control process. The major reason of such assumption is that the malicious packets containing other function codes can be easily filtered by the applied industrial firewall [11,32]. Besides, we generate 60 malicious function code sequences in each experiment.…”
Section: Detection Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation