A Novel Study on Design and Implementation of a Cyber Physical Industrial Control System by Using Cyber Security Techniques

Authors

  • Yagnasri Ashwini  Assistant Professor, CSE (AI&DS) Department, Madanapalle Institute of Technology & Science, Andhra Pradesh, India
  • Chetluru Rohini  Assistant Professor, IT Department, Keshav Memorial Institute of Technology, Hyderabad, Telangana State, India
  • Kondabathula Durga Charan  Assistant Professor, CSE (AI&DS) Department, Madanapalle Institute of Technology & Science. Andhra Pradesh, India
  • Ramakrishna Gandi  Assistant Professor, CSE (AI&DS) Department, Madanapalle Institute of Technology & Science, Andhra Pradesh, India

DOI:

https://doi.org//10.32628/IJSRST229489

Keywords:

Cyber security, cyber attacks, industrial control systems, hybrid testbed, cybercrime, attack detection algorithms, cyber physical system.

Abstract

Because of late expansion in arrangement of Cyber-Physical Industrial Control Systems in various basic frameworks, tending to network protection difficulties of these frameworks is essential for guaranteeing their dependability and secure activity in presence of malignant digital assaults. In the ongoing scene that is controlled by innovation and organization associations, it is vital to know what digital protection is furthermore, to have the option to really utilize it. Frameworks, significant documents, information, and other significant virtual things are in danger on the off chance that there is no security to safeguard it. Securing the data have become perhaps of the greatest test in the current day. Whenever we ponder the network protection the primary thing that rings a bell is 'digital violations' which are expanding monstrously step by step. Different Governments and organizations are going to numerous lengths to forestall these digital wrongdoings. Other than different measures digital protection is as yet an extremely large worry to a large number. Towards this end, fostering a testbed to produce ongoing informational indexes for basic foundation that would be used for approval of constant assault recognition calculations are without a doubt profoundly required. This paper investigates and proposes the design and implementation of a cyber-physical industrial control system testbed where the Tennessee Eastman process is simulated in real-time on a PC and the closed-loop controllers are implemented on the Siemens PLCs. Misleading information infusion digital assaults are infused to the created testbed through the man-in-the-center construction where the vindictive programmers can continuously adjust the sensor estimations that are shipped off the PLCs. Moreover, different digital assault location calculations are created and executed continuously on the testbed and their exhibition and capacities are looked at and assessed.

References

  1. Devrim Unala, "Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed", VOLUME 9, 2021, IEEE Access.
  2. Y. Zhao, Z. Nasrullah, and Z. Li, ``PyOD: A Python toolbox for scalable outlier detection,'' J. Mach. Learn. Res., vol. 20, no. 96, pp. 1-7, Jan. 2019.
  3. A. Winnicki, M. Krotol, and D. Gollmann, ``Cyber-physical system discovery: Reverse engineering physical processes,'' in Proc. 3rd ACM Workshop Cyber-Phys. Syst. Secur., Apr. 2017, pp. 3-14.
  4. I. Kiss, P. Haller, and A. Bereá, ``Denial of service attack detection in case of tennessee eastman challenge process,'' Procedia Technol., vol. 19, pp. 835-841, Dec. 2015.
  5. Ravindra Changala, “A Survey1 on Clustering Techniques to Improve Energy Efficient Routing in Wireless Sensor Networks” in International Journal of Applied Engineering Research, 10(58), pp.-1-5,2015.
  6. G. Bernieri, E. Etchevés Miciolino, F. Pascucci, and R. Setola, ``Monitoring system reaction in cyber-physical testbed under cyber-attacks,'' Comput. Electr. Eng., vol. 59, pp. 86-98, Apr. 2017.
  7. C.-T. Lin, S.-L. Wu, and M.-L. Lee, ``Cyber attack and defense on industry control systems,'' in Proc. IEEE Conf. Dependable Secure Comput., Aug. 2017, pp. 524-526.
  8. M. Teixeira, T. Salman, M. Zolanvari, R. Jain, N. Meskin, and M. Samaka, ``SCADA system testbed for cybersecurity research using machine learning approach,'' Future Internet, vol. 10, no. 8, p. 76, Aug. 2018.
  9. S. Adepu and A. Mathur, ``Distributed attack detection in a water treatment plant: Method and case study,'' IEEE Trans. Dependable Secure Comput., vol. 18, no. 1, pp. 8699, Jan. 2021.
  10. C. M. Ahmed, V. R. Palleti, and A. P. Mathur, ``Wadi: A water distribution testbed for research in the design of secure cyber physical systems,'' in Proc. 3rd Int. Workshop Cyber-Phys. Syst. Smart Water Netw., 2017, pp. 25-28.
  11. Ravindra Changala, “Secured Activity Based Authentication System” in " in Journal of innovations in computer science and engineering (JICSE), Volume 6, Issue 1,Pages 1-4, September 2016.ISSN: 2455-3506.
  12. V. K. Mishra, V. R. Palleti, and A. Mathur, ``A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system,'' Int. J. Crit. Infrastruct. Protection, vol. 26, Sep. 2019, Art. no. 100298.
  13. F. Zhang, H. A. D. E. Kodituwakku, J.W. Hines, and J. Coble, ``Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data,'' IEEE Trans. Ind. Informat., vol. 15, no. 7, pp. 4362-4369, Jul. 2019.
  14. X. Li, C. Zhou, Y.-C. Tian, and Y. Qin, “A dynamic decision-making approach for intrusion response in industrial control systems,'' IEEE Trans. Ind. Informat., vol. 15, no. 5, pp. 25442554, May 2019.
  15. J. J. Downs and E. F. Vogel, “A plant-wide industrial process control problem,'' Comput. Chem. Eng., vol. 17, no. 3, pp. 245-255, Mar. 1993.
  16. N. L. Ricker and J. H. Lee, ``Nonlinear modeling and state estimation for the tennessee eastman challenge process,'' Comput. Chem. Eng., vol. 19, no. 9, pp. 983-1005, Sep. 1995.
  17. Ravindra Changala, “Object Tracking in Wireless Sensor networks using Data mining Techniques”, in IOSR Journal of Electrical and Electronics Engineering, 2015.
  18. PROFIBUS & PROFINET International (PI), Karlsruhe, Germany. PROFINET Security Guideline. Accessed: Feb. 14, 2020. [Online]. Available:https://www.probus.com/download/pro/net-security-guideline
  19. Ravindra Changala, “Online Attendance using PCA Based Image Face Recognition”  to publish in “International Journal for Research in Applied Science and Engineering Technology (IJRASET)” with Impact Factor 1.241, ISSN: 2321-9653,Volume 2, Issue XII, December 2014.
  20. A Sophos Article 04.12v1.dNA, eight trends changing network security by James Lyne. 2.
  21. Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole
  22. Computer Security Practices in Non Profit Organisations – A NetAction Report by Audrie Krause.
  23. A Look back on Cyber Security 2012 by Luis corrons – Panda Labs.
  24. IEEE Security and Privacy Magazine – IEEECS “Safety Critical Systems – Next Generation “July/ Aug 2013.
  25. CIO Asia, September 3rd, H1 2013: Cyber security in malasia by Avanthi Kumar.
  26. https://cltc.berkeley.edu/scenario-back-matter/
  27. https://www.bitdegree.org/tutorials/what-is-cyber-security/
  28. M. Elnour, N. Meskin, K. Khan, and R. Jain, ``A dual-isolation-forestsbased attack detection framework for industrial control systems,'' IEEE Access, vol. 8, pp. 36639-36651, 2020.
  29. F. Pedregosa, G. Varoquaux, and A. Gramfort, ``Scikit-learn: Machine learning in Python,'' J. Mach. Learn. Res., vol. 12, pp. 28252830, Oct. 2011.
  30. K. M. Ting, ``Confusion matrix,'' in Encyclopedia Machine Learning, C. Sammut and G. I. Webb, Eds. Boston, MA: Springer, 2010, p. 209.

Downloads

Published

2022-10-30

Issue

Section

Research Articles

How to Cite

[1]
Yagnasri Ashwini, Chetluru Rohini, Kondabathula Durga Charan, Ramakrishna Gandi, " A Novel Study on Design and Implementation of a Cyber Physical Industrial Control System by Using Cyber Security Techniques, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 5, pp.76-86, September-October-2022. Available at doi : https://doi.org/10.32628/IJSRST229489