Safety securing approach against cyber-attacks for process control system

  title={Safety securing approach against cyber-attacks for process control system},
  author={Yoshihiro Hashimoto and Takeshi Toyoshima and Shuichi Yogo and Masato Koike and Takashi Hamaguchi and Sun Jing and Ichiro Koshijima},
  journal={Comput. Chem. Eng.},
Abstract After the appearance of Stuxnet, the safety assurance against cyber-attacks has been a serious problem for process control. For safety assurance, not only information system securing approaches but also process control original measures are necessary. In this paper, a new protection approach is proposed. Application of an information system securing technique called “zones and conduits” to process control is discussed. By dividing the control system network into plural zones, higher… Expand
Detection of Cyber-attacks with Zone Dividing and PCA
An automatic cyber-attacks detection system using PCA (Principal Component Analysis) is proposed to divide field networks into plural zones and shows that PCA is effective to detect the changes. Expand
Strategic security protection for industrial control systems
Even though serious accidents such as explosion or leakage of poisonous substances have not occurred yet, several cyber-attacks, e.g. Stuxnet, Havex and etc. have been developed to attack industrialExpand
Fishy Cyber Attack Detection in Industrial Control Systems
A new automated approach based on Long Short Term Memory networks capable of detecting attacks and pin point the location of the breach is proposed, which will simulate a simple Water plant. Expand
An application of STAMP to safety and cyber security for ICS
A risk assessment for safety that it is possible to link the physical processes and ICS is suggested using the Systems Theoretic Accident Model and Processes (STAMP). Expand
Development of cad for zone dividing of process control networks to improve cyber security
The candidates of zone division of process control networks, which can assure the safety against concealment and remote operation by cyber attackers, can be proposed. Expand
Industrial Control System Monitoring based on Communication Profile
This paper describes characteristics of communication in the ICS network and proposes a methodology to visualize the I CS network behavior and an illustrative example of pseudo cyber-attack is prepared for understanding the proposed method. Expand
A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems
A software-defined security (SDSec) approach is presented that consists of a hybrid anomaly detection module and a multi-level security response module, both of which work together to secure the ICS field zones. Expand
Major accidents triggered by malicious manipulations of the control system in process facilities
A specific methodology (PHAROS) was developed to address the identification of major accident scenarios achievable by malicious manipulation of physical components of the plant through the control and safety instrumented systems. Expand
A Zoning-Based Secure Control Approach Against Actuator Attacks in Industrial Cyber-Physical Systems
A zoning-based approach is presented in this article for identification and mitigation of actuator attacks in multiple-input multiple-output processes governed by linear time-invariant systems. Expand
Dynamic zoning based on situational activitie for ICS security
A dynamic zoning methodology that is composed of zone design methodology and zone switching methodology to detect higher possibility of cyber-attacks and keep sufficient operability by evaluating process safety under the attacks is proposed. Expand


An approach to potential risk analysis of networked chemical plants
Abstract In order to cope with severe competition in the global market, the local area network installed inside the plant site has been connected with the Internet for exchanging business informationExpand
Design of safe plants considering cyber security
  • In Proceedings of 43rd Autumn Meeting of S. Chem. Engr Japan,
  • 2011
Risk analysis and countermeasure planning against cyber-attacks
  • Journal of Human Factors in Japan,
  • 2011
Review the Department of Homeland Security’s Approach to Risk Analysis
  • National Academy of Sciences.
  • 2010
SCADA system and cyber security
  • Review the Department of Homeland Security ’ s Approach to Risk Analysis
  • 2010