RITICS: Trustworthy Industrial Control Systems
RITICS:值得信赖的工业控制系统
基本信息
- 批准号:EP/L021013/1
- 负责人:
- 金额:$ 96.33万
- 依托单位:
- 依托单位国家:英国
- 项目类别:Research Grant
- 财政年份:2014
- 资助国家:英国
- 起止时间:2014 至 无数据
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
Industrial control systems (ICSs) can take on a range of configurations, involving diverse mixtures of hardware, software, human inputs, network topologies and communication protocols. Generally, an ICS instance may be described as a set of supervisory devices -- including a single device in some cases -- which, through the acquisition of data and the ability to issue instructions, controls the actions and reactions of field devices responsible for the execution of an industrial process or processes. In large utility scale industrial processes, ICSs are manifest as Supervisory Control and Data Acquisition (SCADA) systems; characterised by geographically dispersed control targets requiring centralised management over disparate communication networks, often using diverse protocols and modalities, with varying reliability and latency. At more local scales, such as may be found in manufacturing plants, access to high reliability networks enables ICS specification to be freed of SCADA type constraints, giving rise to ICS manifestations referred to as Distributed Control Systems (DCSs). Examined on even smaller scales, specialised computers known as Programmable Logic Controllers (PLCs) provide control of small numbers of devices and in some cases may represent the entire ICS for a small organisation -- where the scale of a DCS may well be inappropriate. It follows that SCADA systems are often comprised of numerous DCS and PLC subsystems and components.Typically, data input in ICSs is provided by a series of sensors and semi-automated input procedures and control output is issued to field devices such as actuators, switches and other components. Often, general definitions of ICSs stop here, neglecting to include the complex human behavioural and wider organisational policy aspects that are integral to the real-world use and integrity of such systems. Therefore, whenever referring to ICS of any form, this bid will implicitly include such factors, as to neglect doing so would significantly limit the mission of developing trustworthy ICSs, from the outset.Some of the key trends in the development and implementation of ICS of relevance to this bid may be summarised as: the evolution of organisations towards adopting IT solutions to support ICS functions, despite the lack of organisational cultures/structures where the utility and security of both are planned and managed in joint technical committees; increased availability and uptake of ICS solutions in industry of varying scales due to factors such as the drive towards the use of COTS protocols/code modules/middleware for ICS design and delivery (eg: http://openscada.org/); increased interconnectivity of organisations' cyber infrastructures motivated by economic and efficiency drivers; the move toward decentralised control, exploiting edge computing advances; and the loss of expertise in legacy ICS components (configurations, dependencies and failure modes). From both the perspectives of attack success probability and consequence, any one of the above suggest an increase of threat risk to ICSs that would be worth considering. Viewed in combination, however, the argument for increased risk becomes far more explicit and the complexity of the vulnerabilities that need to be addressed begins to become apparent. ICSs are integral to utility, manufacturing and processing industries of all scales and, as a result, the socio-economic impact of their compromise or failure has the potential to be very significant.This research project will address Challenge 3 of the call document: ``What could be novel, effective and efficient interventions?''. In particular, we expect to produce models and tools in support of effective interventions.
工业控制系统(ICS)可以采用一系列配置,涉及硬件、软件、人工输入、网络拓扑和通信协议的各种混合。通常,ICS实例可以被描述为一组监控设备-在某些情况下包括单个设备-通过数据的获取和发出指令的能力,控制负责执行工业过程或过程的现场设备的动作和反应。在大型公用事业规模的工业过程中,ICS表现为监控和数据采集(SCADA)系统;其特征在于地理上分散的控制目标需要通过不同的通信网络进行集中管理,通常使用不同的协议和模式,具有不同的可靠性和延迟。在更局部的尺度上,例如在制造工厂中,访问高可靠性网络使ICS规范能够摆脱SCADA类型的约束,从而产生称为分布式控制系统(DCS)的ICS表现形式。在更小的规模上进行研究,被称为可编程逻辑控制器(PLC)的专用计算机提供对少量设备的控制,在某些情况下,可能代表小型组织的整个ICS-DCS的规模可能不合适。因此SCADA系统通常由许多DCS和PLC子系统和组件组成。通常,ICS中的数据输入由一系列传感器和半自动输入程序提供,控制输出被发送到现场设备,如执行器,开关和其他组件。通常,ICS的一般定义到此为止,忽略了包括复杂的人类行为和更广泛的组织政策方面,这些方面是此类系统在现实世界中的使用和完整性所不可或缺的。因此,无论何时提及任何形式的ICS,本投标书都将隐含包括这样的因素,因为忽略这一点会从一开始就严重限制开发可信赖的ICS的使命。与本投标书相关的ICS开发和实施的一些关键趋势可以总结为:组织朝着采用IT解决方案来支持ICS功能的方向发展,尽管缺乏由联合技术委员会规划和管理两者的效用和安全的组织文化/结构;在不同规模的工业中,由于诸如在ICS设计和交付中使用COTS协议/代码模块/中间件的驱动力等因素,ICS解决方案的可用性和采用率提高(例如:http://openscada.org/);受经济和效率驱动因素的推动,组织网络基础设施的互联性增加;向分散控制的方向发展,利用边缘计算的进步;以及传统ICS组件(配置、依赖性和故障模式)专业知识的丧失。从攻击成功概率和后果两个角度来看,上述任何一个都表明ICSs的威胁风险增加,值得考虑。然而,综合来看,风险增加的论点变得更加明确,需要解决的脆弱性的复杂性开始变得明显。ICSs是所有规模的公用事业、制造业和加工业的组成部分,因此,其妥协或失败的社会经济影响可能非常重大,本研究项目将解决呼吁文件的挑战3:"什么是新颖、有效和高效的干预措施?''.特别是,我们期望制定支持有效干预的模式和工具。
项目成果
期刊论文数量(8)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Scalable Approach to Enhancing ICS Resilience by Network Diversity
通过网络多样性增强 ICS 弹性的可扩展方法
- DOI:10.1109/dsn48063.2020.00055
- 发表时间:2020
- 期刊:
- 影响因子:0
- 作者:Li T
- 通讯作者:Li T
A Model-based Approach to Interdependency between Safety and Security in ICS
基于模型的 ICS 安全与安保相互依赖关系方法
- DOI:10.14236/ewic/ics2015.4
- 发表时间:2015
- 期刊:
- 影响因子:0
- 作者:Li T
- 通讯作者:Li T
Defense-in-depth vs. Critical Component Defense for Industrial Control Systems
工业控制系统的深度防御与关键组件防御
- DOI:10.14236/ewic/ics2016.1
- 发表时间:2016
- 期刊:
- 影响因子:0
- 作者:Fielder A
- 通讯作者:Fielder A
Computer Safety, Reliability, and Security
计算机安全、可靠性和保密性
- DOI:10.1007/978-3-642-24270-0_8
- 发表时间:2011
- 期刊:
- 影响因子:0
- 作者:Felici M
- 通讯作者:Felici M
Critical Information Infrastructures Security
关键信息基础设施安全
- DOI:10.1007/978-3-319-31664-2_24
- 发表时间:2016
- 期刊:
- 影响因子:0
- 作者:Netkachov O
- 通讯作者:Netkachov O
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Chris Hankin其他文献
Program analysis tools
- DOI:
10.1007/s100090050014 - 发表时间:
1998-11-01 - 期刊:
- 影响因子:1.400
- 作者:
Chris Hankin - 通讯作者:
Chris Hankin
An operational semantics for Paragon: A design notation for parallel architectures
- DOI:
10.1007/bf03037642 - 发表时间:
1991-06-01 - 期刊:
- 影响因子:2.800
- 作者:
David Bolton;Chris Hankin;Paul Kelly - 通讯作者:
Paul Kelly
Lambda Calculi: A Guide
Lambda 演算:指南
- DOI:
10.1007/978-94-007-0485-5_1 - 发表时间:
2011 - 期刊:
- 影响因子:0
- 作者:
Chris Hankin - 通讯作者:
Chris Hankin
Chris Hankin的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Chris Hankin', 18)}}的其他基金
Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS)
可信互联信息物理系统研究所 (RITICS)
- 批准号:
EP/R022844/1 - 财政年份:2018
- 资助金额:
$ 96.33万 - 项目类别:
Research Grant
Customized and Adaptive approach for Optimal Cybersecurity Investment
最佳网络安全投资的定制和自适应方法
- 批准号:
EP/R002983/1 - 财政年份:2017
- 资助金额:
$ 96.33万 - 项目类别:
Research Grant
Games and Abstraction: The Science of Cyber Security
游戏和抽象:网络安全科学
- 批准号:
EP/K005790/1 - 财政年份:2013
- 资助金额:
$ 96.33万 - 项目类别:
Research Grant
IDEAS Factory - Detecting Terrorist Activities: Making Sense
IDEAS Factory - 检测恐怖活动:有意义
- 批准号:
EP/H023135/1 - 财政年份:2010
- 资助金额:
$ 96.33万 - 项目类别:
Research Grant
Monochromated Transmission Electron Microscopy
单色透射电子显微镜
- 批准号:
EP/F05677X/1 - 财政年份:2009
- 资助金额:
$ 96.33万 - 项目类别:
Research Grant
Quantum Coherence: Joint Proposal for Optimising UK Research Capacity and Capability
量子相干性:优化英国研究能力和能力的联合提案
- 批准号:
EP/E036112/1 - 财政年份:2007
- 资助金额:
$ 96.33万 - 项目类别:
Research Grant
相似海外基金
Trustworthy Hypothesis Transfer Learning
可信假设迁移学习
- 批准号:
DE240101089 - 财政年份:2024
- 资助金额:
$ 96.33万 - 项目类别:
Discovery Early Career Researcher Award
Collaborative Research: Conference: 2024 Aspiring PIs in Secure and Trustworthy Cyberspace
协作研究:会议:2024 年安全可信网络空间中的有抱负的 PI
- 批准号:
2404952 - 财政年份:2024
- 资助金额:
$ 96.33万 - 项目类别:
Standard Grant
Collaborative Research: Frameworks: MobilityNet: A Trustworthy CI Emulation Tool for Cross-Domain Mobility Data Generation and Sharing towards Multidisciplinary Innovations
协作研究:框架:MobilityNet:用于跨域移动数据生成和共享以实现多学科创新的值得信赖的 CI 仿真工具
- 批准号:
2411152 - 财政年份:2024
- 资助金额:
$ 96.33万 - 项目类别:
Standard Grant
REU Site: Embracing Blockchain for a Secure and Trustworthy Tomorrow
REU 网站:拥抱区块链,打造安全可信的明天
- 批准号:
2349042 - 财政年份:2024
- 资助金额:
$ 96.33万 - 项目类别:
Standard Grant
Toward Trustworthy Generative AI by Integrating Large Language Model with Knowledge Graph
通过将大型语言模型与知识图相结合,迈向可信赖的生成式人工智能
- 批准号:
24K20834 - 财政年份:2024
- 资助金额:
$ 96.33万 - 项目类别:
Grant-in-Aid for Early-Career Scientists
Human-centric Digital Twin Approaches to Trustworthy AI and Robotics for Improved Working Conditions
以人为本的数字孪生方法,实现值得信赖的人工智能和机器人技术,以改善工作条件
- 批准号:
10109582 - 财政年份:2024
- 资助金额:
$ 96.33万 - 项目类别:
EU-Funded
TrustMRI: Trustworthy and Robust Magnetic Resonance Image Reconstruction with Uncertainty Modelling and Deep Learning
TrustMRI:利用不确定性建模和深度学习进行可靠且鲁棒的磁共振图像重建
- 批准号:
EP/X039277/1 - 财政年份:2024
- 资助金额:
$ 96.33万 - 项目类别:
Research Grant
CAREER: Secure and Trustworthy Intent-Based Networking
职业:安全且值得信赖的基于意图的网络
- 批准号:
2339882 - 财政年份:2024
- 资助金额:
$ 96.33万 - 项目类别:
Continuing Grant
Collaborative Research: Frameworks: MobilityNet: A Trustworthy CI Emulation Tool for Cross-Domain Mobility Data Generation and Sharing towards Multidisciplinary Innovations
协作研究:框架:MobilityNet:用于跨域移动数据生成和共享以实现多学科创新的值得信赖的 CI 仿真工具
- 批准号:
2411153 - 财政年份:2024
- 资助金额:
$ 96.33万 - 项目类别:
Standard Grant
Collaborative Research: Conference: 2024 Aspiring PIs in Secure and Trustworthy Cyberspace
协作研究:会议:2024 年安全可信网络空间中的有抱负的 PI
- 批准号:
2404950 - 财政年份:2024
- 资助金额:
$ 96.33万 - 项目类别:
Standard Grant