Novosibirsk State University Journal of Information Technologies
Scientic Journal

ISSN 2410-0420 (Online), ISSN 1818-7900 (Print)

Switch to
Russian

All Issues >> Contents: Volume 12, Issue No 1 (2014)

The development of the actor model based computer simulation modeling method of scada standard state and behavior
Konstantin Andreyevich Barchan

Novosibirsk State University

UDC code: 004; 004.3; 004.4; 004.5; 004.6; 004.7; 004.9; 005

Abstract
The article presents the results of a review of modern ICS and SCADA information security related research directions and technologies. It gives an analysis of actual ICS and SCADA information security related problems. The limitations of modern solutions in the context of actual problems are shown. The new method of an actor model based computer simulation modeling of SCADA standard state and behavior is proposed. The suggested method is intended to detect SCADA infrastructure discredit by malware preventively and has no denoted limitations.

Key Words
Information security, ICS security, SCADA security, simulation modeling, standard model, SCADA state and behavior, actor model, SCADA, ICS

How to cite:
Barchan K. A. The development of the actor model based computer simulation modeling method of scada standard state and behavior // Vestnik NSU Series: Information Technologies. - 2014. - Volume 12, Issue No 1. - P. 11-18. - ISSN 1818-7900. (in Russian).

Full Text in Russian

Available in PDF

References
1. Goldenberg N., Wool A. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems // International Journal of Critical Infrastructure Protection. 2013. Vol. 6, Issue 2. P. 63–75.
2. Barbosa R. R. R., Sadre R., Pras A. Flow whitelisting in SCADA networks // International Journal of Critical Infrastructure Protection. 2013. Vol. 6, Issue 3–4. P. 150–158.
3. Weaver P. SNORT IDS for SCADA Systems / RedHat 5 Enterprise Installation Guide Featuring SCADA ICCP Signatures. URL: http://www.snort.org/assets/114/Snort_RH5_SCADA. pdf (data obrashcheniya: 30.12.2013).
4. Zhu B., Sastry S. SCADA-specific Intrusion Detection / Prevention Systems: A Survey and Taxonomy. URL: http://www.cse.psu.edu/~smclaugh/cse598e-f11/papers/zhu.pdf (data obrashcheniya: 30.12.2013).
5. Byres J. Honeywell selects Tofino™ Modbus Read-only Firewall to Secure Critical Safety Systems. The Univ. of British Columbia. Canada, 2011. URL: http://www.tofinosecurity.com/sites/default/files/pr_hon_modbus_read-only_firewall_01_06_11.pdf (data obrashcheniya: 30.12.2013).
6. Zeng W. Secure Distributed Control Methodologies with Built-in Defense in Distributed Networked Control Systems / North Carolina State University, Raleigh, North Carolina, USA. 2013. URL: http://www.lib.ncsu.edu/resolver/1840.16/8911 (data obrashcheniya: 30.12.2013).
7. Vasenin V. A. Kriticheskaya energeticheskaya infrastruktura: kiberterroristicheskaya ugroza // Informatcionnyye tekhnologii. 2009. № 9. S. 2–8.
8. Byres E., Howard S. Analysis of the Siemens WinCC / PCS7 «Stuxnet» Malware for Industrial Control System Professionals / Tofino Security. Lantzville, BC, Canada. 2010. URL: http://www.scadahacker.com/library/Documents/ICS_Events/Analysis%20of%20Siemens%20Malware%20Attacks%20v3.1%20(Tofino%20Security).pdf (data obrashcheniya: 30.12.2013).
9. Kubyshkin A. S. Razrabotka modeli razgranicheniya prav dostupa dlya avtomatizirovannykh sistem tekhnologicheskogo upravleniya // Vestn. Novosib. gos. un-ta. Seriya: Informatcionnyye tekhnologii. 2012. T. 10, vyp. 3. S. 26–33.
10. Meixell B., Forner E. Out of Control: Demonstrating SCADA Exploitation // Black Hat 2013. Black Hat Conference. Las Vegas, Nevada, USA, 2013. URL: https://media.blackhat.com/us13/US-13-Forner-Out-of-Control-Demonstrating-SCADA-Slides.pdf (data obrashcheniya: 30.12.2013).
11. Stouffer K., Falco J., Scarfone K. Guide to Industrial Control Systems (ICS) Security // National Institute of Standards and Technology Gaithersburg. Gaithersburg, Maryland, USA, 2011. URL: http://csrc.nist.gov/publications/nistpubs/800-82/SP800-82-final.pdf (data obrashcheniya: 30.12.2013).
12. Byres E. Patching for Control Systems – A Broken Model? / Tofino Security. Lantzville, BC, Canada, 2013. URL: https://www.tofinosecurity.com/downloads/691 (data obrashcheniya:30.12.2013).
13. Seymour B., Kabay E. IS Auditing Procedure – Security Assessment – Penetration Testing and Vulnerability Analyses. Document P8 / ISACA. ISACA (Information System Audit and Control Association), Rolling Meadows, Illinois, USA. 2004. URL: http://trygstad.rice.iit.edu: 8000/Audits/Audit%20Checklists/ISAuditingP8PenetrationTesting-ISACA.pdf (data obrashcheniya:30.12.2013).
14. Gritsai G., Timorin A., Goltsev Y., Ilin R., Gordeychik S., Karpin A. SCADA Safety In Numbers V1.1* / Positive Technologies. Moscow, Russian Federation, 2012. URL: http://www.ptsecurity.com/download/SCADA_analytics_english.pdf (data obrashcheniya: 30.12.2013).
15. Revnivykh A. V., Fedotov A. M. Obzor politik informatcionnoi bezopasnosti // Vestn. Novosib. gos. un-ta. Seriya: Informatcionnyye tekhnologii. 2012. T. 10, vyp. 3. C. 66–79.
16. Khemdi A. Takha. Imitatcionnoye modelirovaniye // Vvedeniye v issledovaniye operatcy. Operations Research: An Introduction. 7-e izd. M.: Vilyams, 2007. S. 667–705.
17. Mikheyeva T. V. Informatcionnyye tekhnologii imitatcionnogo modelirovaniya v organizatcii korporativnoi proizvodstvennoi sistemy // Vestn. Novosib. gos. un-ta. Seriya: Informatcionnyye tekhnologii. 2009. T. 7, vyp. 2. S. 42–48.
18. Agha G. Actors: A Model of Concurrent Computation in Distributed Systems. Cambridge: MIT Press Series in Artificial Intelligence, 1986.
19. Xiaojun Liu, Jie Liu, Eker J., Lee E. A. Heterogeneous Modeling and Design of Control Systems / Department of Electrical Engineering and Computer Sciences University of California. Berkeley, California, USA. 2001. URL: http://sec.eecs.berkeley.edu/papers/01/controlsys/controlsys.pdf (data obrashcheniya: 10.03.2014).
20. Vityayev E. E., Kovalerchuk B. Ya., Fedotov A. M., Barakhnin V. B., Durdin D. S., Belov S. D., Demin A. V. Obnaruzheniye zakonomernostei i raspoznavaniye anomalnykh sobyty v potoke dannykh setevogo trafika // Vestn. Novosib. gos. un-ta. Seriya: Informatcionnyye tekhnologii. 2008. T. 6, vyp. 2. S. 57–68.
21. Bezukladnikov I. I., Kon E. L. Problema skrytykh kanalov v promyshlennykh informatcionno-upravlyayushchikh i infokommunikatcionnykh setyakh // Promyshlennyye ASU i kontrollery. 2011. № 7. S. 61–64.

Publication information
Main title Vestnik NSU Series: Information Technologies, Volume 12, Issue No 1 (2014).
Parallel title: Novosibirsk State University Journal of Information Technologies Volume 12, Issue No 1 (2014).

Key title: Vestnik Novosibirskogo gosudarstvennogo universiteta. Seriâ: Informacionnye tehnologii
Abbreviated key title: Vestn. Novosib. Gos. Univ., Ser.: Inf. Tehnol.
Variant title: Vestnik NGU. Seriâ: Informacionnye tehnologii

Year of Publication: 2014
ISSN: 1818-7900 (Print), ISSN 2410-0420 (Online)
Publisher: Novosibirsk State University Press
DSpace handle


|Home Page| |All Issues| |Information for Authors| |Journal Boards| |Ethical principles| |Editorial Policy| |Contact Information| |Old Site in Russian|

inftech@vestnik.nsu.ru
© 2006-2017, Novosibirsk State University.