Skip to main content

A Taxonomy of Vulnerabilities, Attacks, and Security Solutions in Industrial PLCs

  • Chapter
  • First Online:
CyberSecurity in a DevOps Environment

Abstract

In recent years, industrial control systems have been extensively utilized across critical industries, encompassing manufacturing, automation, and power plants. The widespread implementation of these systems within vital infrastructures has escalated the imperative of ensuring their security. This chapter aims to provide a valuable contribution in the form of a taxonomy and a mapping study that addresses security vulnerabilities present in industrial PLC software. The research contains an in-depth analysis of security vulnerabilities, the corresponding exploitative attacks, and the proposed solutions. The primary objective of this chapter is to establish a comprehensive taxonomy that effectively identifies and classifies vulnerabilities, attacks, and solutions pertinent to security in industrial PLCs. Notably, the proposed taxonomy is further demonstrated within the entire DevOps continuum, spanning from the initial design phase to the operational aspect of PLC systems. The outcomes of this research endeavor hold substantial potential in assisting both researchers and practitioners involved in mitigating security vulnerabilities and combatting attacks targeting industrial PLCs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://ieeexplore.ieee.org

  2. 2.

    https://www.scopus.com/

References

  1. C.C. Davidson, T. Andel, M. Yampolskiy, J.T. McDonald, B. Glisson, T. Thomas, in 13th International Conference on Cyber Warfare and Security (2018), pp. 140–149

    Google Scholar 

  2. G. Sandaruwan, P. Ranaweera, V.A. Oleshchuk, in 2013 IEEE 8th International Conference on Industrial and Information Systems (IEEE, 2013), pp. 81–85

    Google Scholar 

  3. S.E. Valentine Jr., PLC code vulnerabilities through SCADA systems, Doctoral dissertation (2013). Retrieved from https://scholarcommons.sc.edu/etd/803

  4. W.C. Yew, PLC device security – tailoring needs, GIAC (GSEC) Gold Certification (2019). https://www.giac.org/research-papers/37612/

  5. J. Weiss, Protecting Industrial Control Systems from Electronic Threats (Momentum Press, 2010)

    Google Scholar 

  6. J. Falco, J. Falco, A. Wavering, F. Proctor, IT Security for Industrial Control Systems (Citeseer, 2002)

    Google Scholar 

  7. K. Stouffer, J. Falco, K. Scarfone, NIST Spec. Publ. 800(82), 16 (2011)

    Google Scholar 

  8. Guide to Industrial Control Systems (ICS) Security. Standard, National Institute of Standards and Technology (2015)

    Google Scholar 

  9. X. Pan, Z. Wang, Y. Sun, J. Cybersecur. 2(2), 69 (2020)

    Google Scholar 

  10. H. Wu, Y. Geng, K. Liu, W. Liu, in IOP Conference Series: Materials Science and Engineering, vol. 569 (IOP Publishing, 2019), p. 042031

    Google Scholar 

  11. I. Pekaric, C. Sauerwein, S. Haselwanter, M. Felderer, Comput. Stand. Interfaces 78, 103539 (2021)

    Article  Google Scholar 

  12. R.C. Nickerson, U. Varshney, J. Muntermann, Eur. J. Inf. Syst. 22(3), 336 (2013)

    Article  Google Scholar 

  13. M. Usman, R. Britto, J. Börstler, E. Mendes, Inf. Softw. Technol. 85, 43 (2017)

    Article  Google Scholar 

  14. P. Bourque, R. Dupuis, A. Abran, J.W. Moore, L. Tripp, IEEE Softw. 16(6), 35 (1999)

    Article  Google Scholar 

  15. K. Petersen, R. Feldt, S. Mujtaba, M. Mattsson, in 12th International Conference on Evaluation and Assessment in Software Engineering (EASE) 12 (2008), pp. 1–10

    Google Scholar 

  16. E.N. Yılmaz, S. Gönen, Comput. Secur. 77, 94 (2018)

    Article  Google Scholar 

  17. H. Wardak, S. Zhioua, A. Almulhem, in 2016 World Congress on Industrial Control Systems Security (WCICSS) (IEEE, 2016), pp. 1–6

    Google Scholar 

  18. J. Pavesi, T. Villegas, A. Perepechko, E. Aguirre, L. Galeazzi, in International Congress of Telematics and Computing (Springer, 2019), pp. 355–364

    Google Scholar 

  19. T. Alves, T. Morris, Comput. Secur. 78, 364 (2018)

    Article  Google Scholar 

  20. E.N. Yrlmaz, H.H. Sayan, F. Üstünsoy, S. Gönen, G. Karacayilmaz, Cyber security analysis of DoS and MitM attacks against PLCs used in smart grids, in 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG), Istanbul, Turkey (2019), pp. 36–40

    Google Scholar 

  21. A. Clark, Q. Zhu, R. Poovendran, T. Başar, in 2013 American Control Conference (IEEE, 2013), pp. 4140–4147

    Google Scholar 

  22. R. Masood, Z. Anwar et al., in 2011 Frontiers of Information Technology (IEEE, 2011), pp. 142–147

    Google Scholar 

  23. M. Khadpe, P. Binnar, F. Kazi, in 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (IEEE, 2020), pp. 1–6

    Google Scholar 

  24. H. Yoo, I. Ahmed, in IFIP International Conference on ICT Systems Security and Privacy Protection (Springer, 2019), pp. 33–48

    Google Scholar 

  25. W. Zhang, Y. Jiao, D. Wu, S. Srinivasa, A. De, S. Ghosh, P. Liu, Procedia Manuf. 39, 270 (2019)

    Article  Google Scholar 

  26. S.A. Milinković, L.R. Lazić, in 2012 20th Telecommunications Forum (TELFOR) (IEEE, 2012), pp. 1536–1539

    Google Scholar 

  27. C. Wohlin, P. Runeson, M. Höst, M.C. Ohlsson, B. Regnell, A. Wesslén, Experimentation in software engineering (Springer Science & Business Media, 2012)

    Google Scholar 

Download references

Acknowledgements

This work has received funding from H2020 under grant agreement No. 737494, from Vinnova through the SmartDelta project and from KKS through the ACICS project. This work was partially supported by the Austrian Science Fund (FWF): I 4701-N.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eduard Paul Enoiu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Enoiu, E.P., Biçoku, K., Seceleanu, C., Felderer, M. (2024). A Taxonomy of Vulnerabilities, Attacks, and Security Solutions in Industrial PLCs. In: Sadovykh, A., Truscan, D., Mallouli, W., Cavalli, A.R., Seceleanu, C., Bagnato, A. (eds) CyberSecurity in a DevOps Environment . Springer, Cham. https://doi.org/10.1007/978-3-031-42212-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-42212-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-42211-9

  • Online ISBN: 978-3-031-42212-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics