Authors
I-Hsien Liu, Kuan-Ming Su, Jung-Shian Li*
Department of Electrical Engineering / Institute of Computer and Communication
Engineering, National Cheng Kung University, No. 1, University Rd., East
Dist., Tainan City 70101, Taiwan
*Corresponding author. Email: [email protected]
Corresponding Author
Jung-Shian Li
Received 9 November 2020, Accepted 6 April 2021, Available Online 28 May
2021.
DOI
https://doi.org/10.2991/jrnal.k.210521.007
Keywords
Industrial control systems; programmable logic controller; information
technology; network security; Ethernet
Abstract
With the trend of Industry 4.0, the communication established by Ethernet
is becoming more and more common in the Industrial Control System (ICS),
and it brings not only pros but also cons like vulnerabilities from information
technology. Furthermore, most devices in the ICS are not ready for cyberattacks,
and it opens up opportunities for attackers. We generalized a procedure
of attacking an Ethernet-enabled ICS and implemented it to the real industrial
system we obtained. The procedure gets the information and access of the
devices in the ICS, like identifying the manufacturer of Programmable Logic
Controllers (PLCs) and overwriting the configuration of PLCs.
Copyright
© 2021 The Authors. Published by ALife Robotics Corp. Ltd.
Open Access
This is an open access article distributed under the CC BY-NC 4.0 license
(http://creativecommons.org/licenses/by-nc/4.0/).