Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel
{"title":"工业物联网系统中的计算机攻击模拟","authors":"Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel","doi":"10.1109/SIBCON56144.2022.10002952","DOIUrl":null,"url":null,"abstract":"Modern IIoT systems include a huge number of sensors and actuators designed to control the processes of technological production. Trusted interaction, which involves the guaranteed transmission of data within such systems, is a key aspect in the operation of such systems. However, the currently available industrial protocols contain a certain number of vulnerabilities, which can destabilize the operations of IIoT systems. That’swhy, when designing such systems, additional attention should be paid to the protection of transmitted data. The current article presents the modeling of computer attacks on the IIoT system, using the industrial Modbus TCP protocol. This protocol is widely used in the design of IIoT systems, also has a number of vulnerabilities","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Computer Attacks Simulation in IIoT Systems\",\"authors\":\"Kirill Tsimbalov, Dmitry Bragin, Vitalii Moseichuk, Artur Mitsel\",\"doi\":\"10.1109/SIBCON56144.2022.10002952\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern IIoT systems include a huge number of sensors and actuators designed to control the processes of technological production. Trusted interaction, which involves the guaranteed transmission of data within such systems, is a key aspect in the operation of such systems. However, the currently available industrial protocols contain a certain number of vulnerabilities, which can destabilize the operations of IIoT systems. That’swhy, when designing such systems, additional attention should be paid to the protection of transmitted data. The current article presents the modeling of computer attacks on the IIoT system, using the industrial Modbus TCP protocol. This protocol is widely used in the design of IIoT systems, also has a number of vulnerabilities\",\"PeriodicalId\":265523,\"journal\":{\"name\":\"2022 International Siberian Conference on Control and Communications (SIBCON)\",\"volume\":\"110 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Siberian Conference on Control and Communications (SIBCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIBCON56144.2022.10002952\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Siberian Conference on Control and Communications (SIBCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCON56144.2022.10002952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modern IIoT systems include a huge number of sensors and actuators designed to control the processes of technological production. Trusted interaction, which involves the guaranteed transmission of data within such systems, is a key aspect in the operation of such systems. However, the currently available industrial protocols contain a certain number of vulnerabilities, which can destabilize the operations of IIoT systems. That’swhy, when designing such systems, additional attention should be paid to the protection of transmitted data. The current article presents the modeling of computer attacks on the IIoT system, using the industrial Modbus TCP protocol. This protocol is widely used in the design of IIoT systems, also has a number of vulnerabilities