Loading…

Methodology for Conducting a Study of the Vulnerability of PLC Control Algorithms to Cyber Attacks

This paper describes a methodology used to test the vulnerability of control algorithms implemented in an industrial Programmable Logic Controller (PLC) environment to cyber attacks. Three stages of testing are discussed. First, we start with a simulation study conducted in MATLAB. Secondly, the cal...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access 2024, Vol.12, p.135551-135563
Main Authors: Plamowski, Sebastian, Nebeluk, Robert, Wojtulewicz, Andrzej, Cabaj, Krzysztof, Chaber, Patryk, Lawrynczuk, Maciej, Marusak, Piotr, Zarzycki, Krzysztof
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This paper describes a methodology used to test the vulnerability of control algorithms implemented in an industrial Programmable Logic Controller (PLC) environment to cyber attacks. Three stages of testing are discussed. First, we start with a simulation study conducted in MATLAB. Secondly, the calculations are implemented using a PLC simulator. These initial stages enable quick and efficient identification of the types of attacks to which the algorithms implemented in the PLC are susceptible. Finally, a set of practical tests on a physical laboratory process controlled by PLC is done. Various attack scenarios are considered, and the vulnerability of control algorithms is carefully evaluated. Based on the obtained results, we formulate practical suggestions for reducing the vulnerability of PLC-based industrial control systems.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2024.3461549