Computer and Modernization

Previous Articles     Next Articles

Security Analysis for PLC Access Control

  

  1. (1. China Electric Power Research Institute, Beijing 100192, China;
    2. State Grid Hebei Electric Power Comapany, Shijiazhuang 050000, China;
    3. State Grid Gansu Electric Power Company Information and Communication Company, Lanzhou 730050, China)
  • Online:2019-09-23 Published:2019-09-23

Abstract: PLC is a very common ICS device that receives and processes data from input devices and controls the output devices. As the core equipment in industrial control systems, PLC has always been the target of choice for attackers. For example, the Stuxnet for ICS, its main target is PLC. Currently, most attacks against PLCs originate from unauthorized access by PLCs. In order to improve the security of PLC equipment, this paper studies the PLC access control problem and discusses several access control models. The password-based access control model is the focus of this paper. Through the traffic analysis and violent cracking methods, this paper analyzes the security of password-based access control mechanism, shows how to store passwords in PLC memory, how to intercept passwords in the network, how to crack passwords, and so on. And through these vulnerabilities, this paper launches more advanced attacks on the ICS system, such as replay, PLC memory corruption, and so on. Finally, in view of the above security issues, this paper gives recommendations and summary of security protection.

Key words: PLC, SCADA, industrial control system, access control, password

CLC Number: