You are on page 1of 9

ISSN 0040-6015, Thermal Engineering, 2016, Vol. 63, No. 13, pp. 948–956. © Pleiades Publishing, Inc., 2016.

Original Russian Text © Y.S. Vasiliev, P.D. Zegzhda, D.P. Zegzhda, 2016, published in Izvestiya Rossiiskoi Akademii Nauk, Energetika.

Providing Security for Automated Process Control Systems


at Hydropower Engineering Facilities
Y. S. Vasiliev, P. D. Zegzhda, and D. P. Zegzhda
Peter the Great St. Petersburg Polytechnic University, St. Petersburg, 195251 Russia
e-mail: zeg@ibks.ftk.spbstu.ru
Received December 30, 2015

Abstract—This article suggests the concept of a cyberphysical system to manage computer security of auto-
mated process control systems at hydropower engineering facilities. According to the authors, this system
consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber
attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower
engineering systems is suggested. The architecture of the multilevel protection of the automated process con-
trol system (APCS) of power engineering facilities is given, including security systems, control systems, access
control, encryption, secure virtual private network of subsystems for monitoring and analysis of security
events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when
SCADA is integrated with the unified enterprise information system.

Keywords: computer security, hydropower engineering facilities, cyber attacks, APCS, SCADA
DOI: 10.1134/S0040601516130073

INTRODUCTION 1. SECURITY IN THE ERA


The current development phase of postindustrial OF GLOBALIZATION
society is characterized by continuous information The combination of communication systems and
revolution that consists in integrating Internet tech- data processing tools has led to a new phase of produc-
nologies with virtually all systems of production ACS, tion process improvement in the form of continuous
power engineering and communication systems, tracking of process state and process–environment
banking systems, and, of course, defense systems. interaction. With respective computation capacities, the
As a result of informatization at power production entire production process can thus be presented as a sin-
facilities, components of automated process control gle system. Not only does this system provide the possi-
systems (APCSs) have become part of common cyber- bility of automated control but sometimes it can even be
space. The consequences of cyberspace expansion to self-regulating (adapting), which allows sustaining the
ensure cyberspace security are: system in a target zone of efficient performance.
(1) The versatility of the Internet as the living envi- Internetization has resulted in:
ronment for cyberspace makes it possible to combine (1) organizational modifications of production
all aspects of production, financial, and sociopolitical designs transformed into a form suitable for distrib-
life into one single whole and form the transitive clo- uted adaptive and remote control; and
sure of all computer systems. (2) changes in concept and production designs,
(2) Creation of possibilities in principle of avail- which increases the share of data components, that
ability of any Internet-related computer devices. ensure and automatize physical components perfor-
(3) Origin of the cybersecurity (cyberspace security) mance, and makes it possible to refer hydropower
concept characterized by the birth of a new class of engineering systems to a new class of objects called
threats, determined by openness of modern IT, and new cyberphysical systems [2, 3].
arrangements for delivering destructive means [1, 2]. Thus, informatization globalization via interneti-
The goal of this article is to try analyze the main zation has resulted in structural modifications of pro-
trends in nascence of new threats and their routes in duction designs and their evolution with an increasing
hydropower engineering with the aim of drawing share and importance of information (progressive)
experts’ attention to commingle their efforts for resist- components, i.e., transformed them into a cyberphys-
ing the challenges of modernity. ical object.

948
PROVIDING SECURITY FOR AUTOMATED PROCESS CONTROL SYSTEMS 949

Set of physical The logical structure is shown in Fig. 1 [5].


components Internet The emergence of cyberspace is currently insepara-
for process Corporate
ble from the concept of cybersecurity manifested in
implementation such factors as possibility of hidden, remote, and hardly
enterprise detectable catastrophic exposures and operability
network data dependence of modern production systems as cyber
Executive unit environment objects on deliberate and random computer exposures.
for physical
process control
Commonly referred to as cyber threats or cyber
attacks [6], these phenomena have become far more
widespread in the last decade [3]; this is why it has
Control become necessary to protect modern power engineer-
Feedback ing, transportation, financial, and, of course, special-
center
purpose systems against cyber threats.
Critical systems are commonly defined as a type of
Fig. 1. Logical structure of the cyberphysical system. systems with a developed infrastructure in which oper-
ating troubles may be caused by cyber attacks. Hydro-
power engineering systems should be rightfully
2. CYBERSECURITY referred to this type.
OF INDUSTRIAL SYSTEMS
In this article, operational stability of hydropower
The concept of a cyberphysical object (or system as engineering systems as cyberphysical objects is consid-
a collection of such) is a convenient conceptual frame- ered specifically in terms of cybersecurity.
work for representing production and processing
designs that integrate systems of transformation of dif-
ferent kinds of energy with information-communicative 3. CYBERSECURITY
environment. This environment ensures the exchange IN POWER ENGINEERING
among components and sustainable operation of the The relevance of cyberspace security provision is
entire system by monitoring and automated control. exemplified by data components of automated power
The distinct features of cyberphysical systems are engineering process control systems.
specified in [4] and include: The APCS is an intricate hi-tech set of hardware
(1) high computerizing level, continuous telecom- and software intended to ensure automated control of
munication (data exchange) with similar systems and industrial, transportation, and processing equipment
communication with the Internet; and operations at production site in general or in par-
ticular production areas [5].
(2) availability of the center (subsystem) of auto-
mated system operation control and stable operability The APCS is a single information and telecom-
sustenance under different disturbances from the envi- munication system with several control user inter-
ronment, including purposeful and random influences; faces (terminals), tools and media for transfer, pro-
cessing, and storage of information on progress of
(3) availability of the common data space or cyber- controlled processes, and also terminating hardware
space that is a set of firmware for data processing and automation elements, such as sensors, controllers,
transfer, intrasystem exchange and exchange with the actuating units. All the APCS elements form a com-
environment, systems of automated control of physi- plex supervisory control, telemetry, and communica-
cal components by programmable logic controllers, tion infrastructure interconnected on the basis of
and sustenance of a given performance script suitable industrial APCS (SCADA) protocols.
for adaptive control, and also data protection cryptos-
ervers, firewalls, antiviruses, etc.; SCADA (Supervisory Control and Data Acquisi-
tion) is a software package that is intended for develop-
(4) intelligent control of automated generation of ment or support of APCS operations in real-time mode
work scripts, based on automated prediction and and includes subsystems of acquisition, processing, dis-
adaptive control, which ensures systems self-contain- play, and archiving of information on controlled and
ment and reduces the dependence on the operator. monitored objects and facilities. SCADA is used in
Thus, the conceptual logical design of the cyber- APCSs in all critical production sectors, where real-
physical system includes a set of connected physical time process control by the operator is required.
components responsible for implementing production SCADA systems are packaged with supplementary soft-
processes, a set of connected information components ware for programming of industrial controllers (so-
responsible for process control at different automation called integrated SCADA systems, SoftLogic SCADA).
levels, and a communicative environment that ensures Currently, the most popular SCADA systems are such
data exchange within the system and with the environ- software products as Simatic WinCC; CitectSCADA;
ment and transmits control commands to actuating Proficy iFIX; Wonderware inTouch. All of the most
units via PLCs. common SCADA systems are operated on the Win-

THERMAL ENGINEERING Vol. 63 No. 13 2016


950 VASILIEV et al.

Table 1. APCS security violations


No. Incident site Date Incident details
Modifications of the valve operation parameters in the SCADA
system of wastewater treatment plants resulted in the discharge
1 Queensland, Australia Oct. 2001
of nontreated wastewater onto the city streets, into the river, and
then into the ocean
Computers responsible for controlling life-sustenance systems
2 Amudsen–Scott South Pole Station Jan. 2003 hacked, money reward
required in return of the safety at the station
SQL Slammer infected the office computers and penetrated the
Davis-Besse nuclear power
3 Jan. 2003 power station control network due to vulnerable Microsoft soft-
station in Ohio (United States)
ware
Water supply system in Illinois Breakdown of a pump used to supply water to thousands
4 Nov. 2011
(United States) of houses

dows platform, use different database control systems Industrial facilities in Iran have been regularly
and application program interfaces (APIs), and support attacked by the Stuxnet worm and its modified ver-
various remote control protocols. This aspect ensures sions since 2010 onwards. The data stream between
such strong points of APCSs as high control and Siemens Simatic Step 7 programmable logic control-
response rates, simple structure, etc. However, it also lers and Siemens Simatic WinCC workstations of the
determines the tight hierarchy and cascadeness of SCADA system is intercepted and modified. Thus, a
APCS segments, which consists in the complicated means has been used to attempt unauthorized data
procedure of replacing APCS components and ava- acquisition and subversions in APCS of Iranian indus-
lanche-like response from components in case of emer- trial enterprises, power station, and airports. The pro-
gencies that determine the security of APCSs, safety at gram’s uniqueness was that it had been the first ever
industrial production facilities, and sectoral safety in case of purposeful destruction of sectoral infrastruc-
general. ture in history [8].
The specific solution of this problem is determined A major role in the list of APCS security threats is
by technical characteristics of APCSs, such as played by threats to infrastructure and operation sys-
tems of SCADA systems [6]. Most APCS software
(1) distributive nature of components and hetero- components are based on the MS Windows platform
geneous (nonuniform) information and software con- that has traditionally contained mistakes leading to
stituents, which shows in the diversity of used opera- security violations. However, whereas exposures on
tion systems (OSs), communications, hardware, soft- general-purpose computers are eliminated by regular
ware and user interfaces; software updates from the manufacturer, this is
(2) geographical remoteness of informatization and impossible in SCADA systems because system updates
control objects and segments; suspend process activities and may negatively affect
further operation of SCADA [5]. In addition, there are
(3) active role of the human element amplified by problems solved for information systems but without
criticality of controlled objects or industrial cycle any required solution for APCSs; these problems
technology; and include errors in automated control software, vulnera-
(4) absence of any universal approach and solu- bilities in system configuration setting, vulnerabilities
tions tailored for a specific task of controlling a partic- in data transmission media, vulnerabilities in con-
ular process, sector, or production site. trolling network protocols, and absence of required
protection for data transmission lines.
Thus, the security of APCSs is an urgent task
3.1. Safety and Security at Power Engineering APCSs: requiring a prompt solution.
Problem Urgency The facts of security violations in power engineer-
The Sayano-Shushenskaya power station accident ing and hydrosystem APCSs are given in Table 1.
happened in 2009. It had been caused by a number of According to the analysis, the main cause of the
factors, including the disordered operation of the reg- increasing number of security violations in APCSs is
ulating system that varied the loading of hydropower integration with corporate systems, little consideration
sets with regard to the current workload of the electric given to security maintenance systems, and disregard
power system [7]. of network security components.

THERMAL ENGINEERING Vol. 63 No. 13 2016


PROVIDING SECURITY FOR AUTOMATED PROCESS CONTROL SYSTEMS 951

Connection power engineering facilities radically differ from office


to other industrial systems and data processing centers. Now, we shall
and corporate enumerate the factors that directly affect the security
networks provision issue and must be taken into account while
elaborating the approach to protecting APCSs [12].
(1) Distributive nature of components and hetero-
geneous (nonuniform) information and software con-
Internet stituents. APCSs are large-scale, complex, hi-tech
information hardware and software systems with a
diversity of used OS, communications, equipment,
and software and user interfaces, very often with geo-
graphically remote informatization and control seg-
ments and objects. At the same time, these systems are
Fig. 2. Paths of impact on APCSs at power engineering designed without taking account of information secu-
facilities. rity provision requirements and, therefore, incompat-
ible with APCSs with traditional approaches to reli-
ability and security provision.
According to the surveys of the Ural Center for (2) APCSs are extremely conservative. Unlike con-
Security Systems (UCSS) [9], even common security stantly improved and adjusted office systems regularly
tools and means are used inefficiently, which is proven updated via the Internet, software of APCS compo-
by the following facts: nents implemented at industrial facilities are hardly
(1) Of all engineering protection arrangements, updated at all. This is due to the fact that an embedded
network security assurance measures of various full- software developer cannot ensure full-scale software
ness and sufficiency have been taken at 88% of the tests by the company; thus, the software can be tested
facilities; moreover, the remote access and/or access at real-life objects only.
from the corporate network is ensured for APCSs in (3) APCSs strongly depend on their operating envi-
17% of the cases. ronment and are very sensitive to its modification.
(2) Embedded protection means are used mainly to Office systems are constantly developed and
limit unauthorized human-machine communication reworked, and their parts can be replaced with more
(data mart mode, etc.); at the lower level (PLCs), modern or similar components compatible by com-
these means are either unadjusted or disabled. munication protocols. Moreover, an office system can
(3) Antivirus protection is used in 25% of APCSs; be updated by adding new components (e.g., control
however, virus definitions are updated only in 11% of and protective means) given that they support the pro-
APCSs. tocols used in the system. This is critical to protection
(4) System and applied software are regularly means that must not affect the system itself but only
updated only in 8% of APCSs. control its operation (data flow ciphering devices,
That is why there were 108 incidents fixed by intruder detection systems, antiviruses, etc.). As
ICS-CERT [3] in the first half of 2015: 20% of them attested by practical use of protective means and tools,
occurred in critical production areas, 13% were sometimes they block the operation of the system,
power engineering incidents, and 18% occurred in which is not critical to most office applications but
power production systems (hydropower and thermal may carry catastrophic effects for APCSs used at
power plants). hydropower engineering facilities.
The urgency of APCS-related problems that (4) Active human influence amplified by criticality
require prompt solution and development of ground- of controlled objects and industrial cycle technologies.
breaking world-class technologies is determined by At the same time, personnel usually shows insufficient
the Russian national security strategy, according to IT and information security expertise. Combined with
which studies of problems in all-Russia information high operational criticality of objects, this determines
structure in the globalizing world and development of the high risk of possible attacks based on social engi-
means and methods of safety and security precautions neering.
in automated control systems are classified as priority The main violations result from the large number of
tasks [10, 11]. external connection lines: thus, there are huge opportu-
nities for external, sometimes purposeful influence on
information components of APCSs, which is shown in
4. SPECIFIC ISSUES OF SAFETY Fig. 2.
AND SECURITY PRECAUTIONS Actually, the APCS is the intermediate link in the
FOR APCSS IN HYDROPOWER ENGINEERING general information enterprise structure and can
In terms of purpose, operating conditions, and exchange information both with the corporate-wide
used tools and technologies, APCSs used at hydro- network including administrative services, industrial

THERMAL ENGINEERING Vol. 63 No. 13 2016


952 VASILIEV et al.

However, computerized ECSs are integrated with


Enterprise the common information environment and become
level part of the common cyberspace, i.e., objects of specific
Remote cyber attacks that use weak points in applied software
Shop Operator and communication control means as well as connec-
level PLC CNC station
interfaces nodes tions with the common environment. This is shown in
Industrial Fig. 4, where the telecommunication and logical con-
Robot nection among the APCS, the ECS, and the corporate-
controller PLC CNC control
level devices wide network of electric system planning and control
with permanent Internet access is given.
Peripherals I/O devices Sensors Actuating
devices A fact important to this article is that systems inte-
level grating APCSs and office networks are more vulnera-
Fig. 3. APCS hardware components available from the ble, more exposed to potential intrusions and,
enterprise data network (PLC is for programmable logic although necessary, their cybersecurity becomes a
controllers; CNC is for computerized numerical control finer link than emergency protection.
machines). Thus, one should note that it is necessary to solve
the security provision problem for APCSs at hydro-
power engineering facilities, which depends on the fol-
Data acquisition
lowing factors [14–16]:
Energy Commands Data control Enterprise
(1) possibility of localizing and identifying over the
exchange Settings center data network
Internet industrial equipment and software in local
and global networks;
APCS Emergency (2) existence of weak authorization and authenti-
protection cation means (authentication data weaved in the firm-
system ware, authentication data by default, unreliable
authentication algorithms, etc.);
Control script
(3) absence of encryption in industrial transport
Internet protocols, such as modbus, s7comm, etc.;
(4) absence of OS and application upgrades;
Fig. 4. Data exchange circuit in systems with emergency (5) dependence on the operating environment and
protection. difficulties with adopting protective means;
(6) difficult communication control (large amounts
of data);
departments, suppliers, etc. and the Internet and with (7) human influence.
specific subsystems of a hydropower plant up to the
level of controlling industrial controllers and periph-
eral equipment (Fig. 3). 5. MAIN AREAS OF SECURITY PROVISION
Thus, an operator who makes a mistake or shows FOR APCSS AT POWER ENGINEERING
negligence may cause serious troubles in a hydropower FACILITIES
system control with severe effects. An opportunity is The specifics of security provision for APCSs in
created to execute remote commands for process con- power engineering is conditioned by their technical
trol or self-regulation and automated adaptation to characteristics, such as distributed components and
variable conditions. heterogeneous information and program constituents
All power-engineering facilities are currently and geographical remoteness of informatization and
equipped with emergency control systems (ECSs). controlled objects and segments. Consequently, com-
They are intended to prevent disorders in operational mon approaches to reliability and security provision
stability of electric energy systems by defining settings do not fit for APCSs.
on the basis of monitoring data and tentative design of It can be concluded from the foregoing that emer-
specific circuit-mode, mode-balance, and emergency gency control systems do not ensure emergency pre-
situations [13] and to stop the process in case of non- vention. They are a part of the common information
routine events and inherently false commands (Fig. 4). environment and can become objects of catastrophic
Correct operation of ECSs makes it necessary to attacks.
acquire and process large amounts of data from sensors The main routes of these adverse influences result
and tracking systems that record the state of the object, from the following factors:
whereas automated acquisition of monitoring data (1) risk of bypassing ECSs or blocking them alto-
expands lists of controlled parameters and reduces the gether using their information and communication
time for elaborating emergency commands. components;

THERMAL ENGINEERING Vol. 63 No. 13 2016


PROVIDING SECURITY FOR AUTOMATED PROCESS CONTROL SYSTEMS 953

Enterprise resource planning


ERP (accounting, procurement, marketing, etc.)
systems Enterprise resource management

Production Production performance system


management (technology management)
AECS
APCS SCADA (supervisory process
APCS control system)
Data acquisition and direct
control based on using
Data acquisition system sensors, regulators,
and actuating units
Data input-output
I/O (sensor, actuating
units, regulatory bodies)

Process facility

Fig. 5. Hierarchy of automated systems at a power engineering facility.

(2) potential spoofing or blocking of control com- trolling network protocols, and absence of enciphering
mands; for data transmission paths.
(3) human factor because, sometimes, the decision As shown in Table 2, APCSs have already gained
to disable the ECS is taken specifically by the operator; widespread use in Russia.
(4) threats of purposeful information onslaught on Typical protection systems developed for APCSs
the system and applied software of the ECS; based on such SCADA as WinCC, inTouch, etc.
include protection against cyber attacks, separation of
(5) in terms of security, the ECS can be considered access to APCS elements, communication path con-
the ACS of some part of the process. trol, etc.
Security provision for power facilities includes a set However, when carried over to differently config-
of specific problems aimed at protecting the informa- ured APCSs, these solutions require adaptation; more-
tion components of the electric power system and its over, they do not assure protection against all threats.
whole architecture, integrating ECSs, APCSs, operat- Thus, the primary phase of power facility protection
ing units, and communication systems as required by must be to recognize security threats to APCSs.
the hierarchy of the information networks of the power
facility (Fig. 5).
One should take into account that there are some 5.1 Recognition of Security Threats to APCSs
problems solved for information systems but with no of Electric Power Systems
coherent solution for APCSs. These problems include APCSs include hardware and software constitu-
errors in automated control software, vulnerabilities in ents. Typical hardware tools are the Master Terminal
system configuration setting, vulnerabilities in con- Unit (MTU) installed in the control center, commu-

Table 2. Applications of foreign SCADA systems in Russian APCSs


Type APCS site and name

WinCC Diagnostics and information system of the turbine generator set at the Samara CHP plant
Citect SCADA APCS of the power generating set at the Stavropol SDPP
inTouch APCS of boilers and turbines at OAO (OJSC) Novosibirskenergo
iFIX APCS at CHP plant 13 of OAO (OJSC) Permenergo

THERMAL ENGINEERING Vol. 63 No. 13 2016


954 VASILIEV et al.

nication equipment, and Remote Terminal Unit The reality is that the SCADA must be connected
(RTU) or PLC that control mechanical drives and/or to the corporate-wide network. This connection is a
sensors. The MTU stores and processes information serious security threat, and due attention should be
from the RTU inputs and outputs, whereas the RTU given to its development and actualization. If the net-
or the PLC are responsible for local process control. works must be connected, we recommend introducing
Communication hardware makes it possible to trans- a minimal number of connections passing through the
mit information and data between the MTU and the firewall (FW) and the demilitarized zone (DMZ). The
RTU or the PLC. The software is configured to give DMZ is a separate network segment directly con-
the following commands to the system: what query is nected to the FW. The servers with the APCS data, the
necessary to make and when, what are acceptable access to which must be gained from the corporate-
value ranges for certain parameters, and how to react wide network, are placed in this network segment;
to variations in external parameters. SCADA systems however, these systems must be available from the cor-
are usually developed as failsafe systems with signifi- porate network. The minimal access through the FW,
cant redundancy embedded in the system architec- including the opening of only those ports that are nec-
ture. Specific threats typical of industrial systems are essary for certain means of communication, are
largely determined exactly by their architectural char- allowed for any external relations (Fig. 6) [2, 12, 14].
acteristics. The main trend in the development of APCSs is
Security threats typical of APCSs of electric power consolidation of industrial and corporate-wide net-
systems can be classified by: works. The fact that APCSs have a long service life of 15
(1) used types of vulnerabilities, such as organiza- to 20 years, use specialized means of communication
tional, configuration, software, network edge, and (consequently, a lot of different protocols), and were
communication system vulnerabilities; designed without taking account the required informa-
(2) types of consequences, such as information dis- tion security provision attests to increased risks of secu-
closure, service denial, access denial, control denial, rity violations of APCSs integrated with corporate-wide
presentation denial, presentation substitution; IT systems. Technologies for protection of initially
unprotected control systems are based on network seg-
(3) threatened objects, such as SCADA, PLC, OS regation, logical separation of the control network from
and infrastructure, transport protocols. the corporate-wide network, and use of firewalls.
We should mention such typical industrial threats Industrial equipment manufacturers do make attempts
as presentation denial and presentation substitution: to embed security functions (authentication, password
they are usually fulfilled by user substitution (spoof- protection of PLC); without additional protective
ing) attacks, and the result is either that the APCS means, however, these APCS components remain
operator loses control of the system or receives unreli- unprotected because of their architecture designed
able information and does not notice occurrence of without regard to IS requirements.
emergencies. The main areas of security provision for APCSs at
There are several basic standards that combine power facilities must include [3, 5, 16]:
industrial protocols describing network interfaces and (1) Security provision arrangements, such as
bus field requirements (ANSI/ISA-50.02, IEC 62026,
IEC 61158, IEC 61784, IEC 61918); however, there is (a) elaboration of security policies and procedures;
no common standard. Almost all the described proto- (b) evaluation of risks and exposures;
cols are required to function in real-time mode, which (c) personnel training and advanced employee
is why most of them have no embedded security pro- training in security matters.
vision tools, neither enciphering, or digital signature. (2) Control network security provision measures,
such as
5.2 General Layout of the Security Architecture (a) determination of external network communica-
of APCSs Used in Electric Power Systems tion paths of APCSs;
To resist the foregoing threats while designing the (b) control of all communication paths via firewalls;
network architecture, we recommend separating the (c) distinguishing of several demilitarized zones;
SCADA network from the corporate-wide network for (d) logical separation of the control network.
sweeping the APCS. The strict control of changes in
(3) APCS security control, including
the network equipment operation, configuration, and
software is inappropriate in the corporate-wide net- (a) user identity check;
work. The SCADA network traffic flowing in the cor- (b) access control;
porate-wide network can be easily intercepted or (c) information auditing;
exposed to DoS attacks. In case of separate networks,
(d) enciphering;
the SCADA network must remain unaffected by secu-
rity and capacity problems of the corporate-wide net- (e) virtual private network (VPN).
work [3, 12, 17]. (4) Monitoring:

THERMAL ENGINEERING Vol. 63 No. 13 2016


PROVIDING SECURITY FOR AUTOMATED PROCESS CONTROL SYSTEMS 955

Modem Data Applica- Configu-


pool acquisition tions DB ration HMI Engineering
server server Historian server server devices workstation
ATS
PLC
Field bus
Infrastructure SCADA LAN
for access Web server Log history
to field devices DB Security Authenti-
server cation
External server
WEB DMZ
Remote VPN
DB DMZ
archiving access
Remote Security DMZ
corporate network Authentication DMZ
ATS Applica-
Corporate Worksta- tions WLAN
connect access
server tions server Mail server FTP server point
Modem
pool DNS server Authenti-
Internet cation
Web server server
Corporate LAN
DNS DMZ
Mail DMZ
Web DMZ
External communication FTR DMZ
infrastructure Corporate Authentication DMZ
FW
Intruder detection system Wireless DMZ

Fig. 6. Architecture of multilevel protection of APCSs at power engineering facilities.

(a) comprehensive monitoring of system events, 5. K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, and
security event recognition and analysis; A. Hahn, “Guide to industrial control systems (ICS)
security. Revision 2,” (Available from National Insti-
(b) system security testing.
tute of Standards and Technology, Special Publication
800-82 Revision 2, 2015). http://dx.doi.org/. doi
CONCLUSIONS 10.6028/NIST.SP.800-82r2
6. F. B. Schneider, “Blueprint for a science of cybersecu-
Security tools can be efficiently integrated with rity,” The Next Wave 19 (2), 47–57 (2012).
APCSs at hydropower engineering facilities on the
7. Report on Technical Investigation on Causes of the Acci-
condition that a comprehensive program is developed dent that Occurred on August 17, 2009 at the Filial
and implemented from a definition of goals and oper- Branch of the OJSC “RosHydro” — P. S. Neporozhny
ations up to full-scale audit and improvement plans. Sayano-Shushenskaya Hydroelectric Power Plant,
An efficient security strategy for APCSs must include (Fond Nats. Energ. Bezop. (FNEB), 2009). http://
deep protection and hierarchically structured security www.energystate.ru/news/files/Sayano-Shushenskaya-
tools and means to minimize effects of breakdowns of GES–akt-rassledovaniya.pdf.
any mechanisms whatever. 8. Stuxnet Code Analysis (ESET, 2010; Symantec, 2011;
Nauchn. Tsentr “NATsILUS”, 2011). http://aroundcyber.
REFERENCES files.wordpress.com/2012/11/stuxnet-codeanalys-rus.pdf.
9. UTsSB — Ural Center of Security Systems.
1. K. Andersson, Cybersecurity: Public Sector Threats and http://www.ussc.ru/about/.
Responses (CRC, Boca Raton, FL, 2012).
10. Yu. S. Vasil’ev, D. P. Zegzhda, P. D. Zegzhda, and
2. Critical Infrastructure Protection II, Ed. by M. Papa and T. V. Stepanova, “Towards technological indepen-
S. Shenoi (Springer-Verlag, New York, 2012). dence of Russian cybersecurity branch,” in Probl. Inf.
3. Y. S. Vasiliev, P. D. Zegzhda, and V. I. Kuvshinov, “Mod- Bezop. Komp’yut. Sist., No. 4, 17–29 (2014).
ern problems of cybersecurity,” Nonlinear Phenom. 11. Yu. S. Vasil’ev and D. P. Zegzhda, To the Question of
Complex Syst. (Minsk, Belarus) 17 (3), 210–214 (2014). Cyber Security of Autonomous Control Systems in Power
http://www.j-npcs.org/online/vol2014/v17no3p210.pdf. Engineering (S. Peterb. Gos. Politekh. Univ., St. Peters-
4. R. Axelrod and R. Iliev, “Timing of cyber conflict,” Proc. burg, 2015) [in Russian].
Natl. Acad. Sci. U. S. A. 111 (4), 1298–1303 (2014). 12. R. R. R. Barbosa, R. Sadre, A. Pras, “Difficulties in
www.pnas.org/cgi/doi/10.1073/pnas.1322638111. modelling SCADA traffic: A comparative analysis,” in

THERMAL ENGINEERING Vol. 63 No. 13 2016


956 VASILIEV et al.

Proc 13th Int. Conf. “Passive and Active Measurement” Tools of Information Security,” June 29–July 2, 2015
(PAM 2012), Vienna, Mar. 12–14, 2012 (Springer-Ver- (S.-Peterb. Politekh. Univ., St. Petersburg, 2015),
lag, Berlin, 2012), pp. 126–135. pp. 16–20.
13. B. Zhu, A. Joseph, S. Sastry, “A taxonomy of cyber attacks 16. Yu. S. Vasil’ev and P. D. Zegzhda, “Information secu-
on SCADA systems,” in Proc. 2011 Int. Conf. on Internet of rity in hydropower engineering,” in Abstracts 9th Sci.-
Things and 4th Int. Conf. on Cyber, Physical and Social Pract. Conf. “Hydropower. New Developments and Tech-
Computing (iThings/CPSCom), Dalian, China, Oct. 19– nologies,” St. Petersburg, Oct. 22–24, 2015 (Vseross.
22, 2011 (IEEE, 2011). http://www.researchgate.net/ Nauchno-Issl. Inst. Gidrotekh. B. E. Vedeneeva,
publication/254049910. doi 10.1109/iThings/CPSCom. St. Petersburg, 2015), Part 1, p. 31.
2011.3410.1109/iThings/CPSCom.2011.34
14. P. D. Zegzhda, T. V. Stepanova, and A. I. Pechenkin, 17. S. Baker, N. Filipiak, and K. Timlin, In the Dark: Cru-
“Security of power system ICS, which implement cial Industries Confront Cyberattacks (McAfee Rep.,
industrial network communication protocols,” Izv. 2011). http://www.mcafee.com/us/resources/reports/
Ross. Akad. Nauk, Energ., No. 5, 59–64 (2013). rp-critical-infrastructure-protection.pdf.
15. P. D. Zegzhda, “Modern state of cyber security,” in
Proc. 24th Sci.-Pract. Conf. “Methods and Technical Translated by S. Kuznetsov

THERMAL ENGINEERING Vol. 63 No. 13 2016

You might also like