Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel
{"title":"Computer Attacks Simulation in IIoT Systems","authors":"Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel","doi":"10.1109/SIBCON56144.2022.10002952","DOIUrl":null,"url":null,"abstract":"Modern IIoT systems include a huge number of sensors and actuators designed to control the processes of technological production. Trusted interaction, which involves the guaranteed transmission of data within such systems, is a key aspect in the operation of such systems. However, the currently available industrial protocols contain a certain number of vulnerabilities, which can destabilize the operations of IIoT systems. That’swhy, when designing such systems, additional attention should be paid to the protection of transmitted data. The current article presents the modeling of computer attacks on the IIoT system, using the industrial Modbus TCP protocol. This protocol is widely used in the design of IIoT systems, also has a number of vulnerabilities","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Siberian Conference on Control and Communications (SIBCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCON56144.2022.10002952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Modern IIoT systems include a huge number of sensors and actuators designed to control the processes of technological production. Trusted interaction, which involves the guaranteed transmission of data within such systems, is a key aspect in the operation of such systems. However, the currently available industrial protocols contain a certain number of vulnerabilities, which can destabilize the operations of IIoT systems. That’swhy, when designing such systems, additional attention should be paid to the protection of transmitted data. The current article presents the modeling of computer attacks on the IIoT system, using the industrial Modbus TCP protocol. This protocol is widely used in the design of IIoT systems, also has a number of vulnerabilities