Abstract

This paper considers a verification problem of the whitelist function applicable to the Programmable Logic Controller (PLC). The PLC of the industrial control system is an important controller to control sensors and actuators and requires security functions because PLCs are becoming targets for cyber-attacks such as malware and zero-day attacks. One of the PLC security functions is a whitelisting system that registers normal operations as a safety list and detects the operations not registered in the list as abnormal operations. The detection performance of the whitelist depends on how accurately the normal operation of PLC is modeled via Petri net. Therefore, it is necessary to verify the consistency of the normal operation and whitelist of the PLC. Verification of the consistency allows us to evaluate the detection range and to suppress false detection. The previous work of the current authors demonstrates that the Petri net model allows us to generate the whitelist from the control program of PLC. The whitelist generation is composed of two processes: The first is to convert a control program to a Petri net and the second is to convert a Petri net model to a whitelist. Thus, this paper proposes two whitelist verification methods. The first is a model verification method to verify the Petri net model using reachability of the Petri net. The second is an exhaustive test method to verify the whitelist operation. Furthermore, it is expected that the proposed methods are applicable for evaluation and verification of detection performance when the whitelist is compressed to reduce the load on the PLC.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.