THE 3 rd INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
146
The expansion of cyber-attacks on ICS in recent years has revealed a
vast number of security vulnerabilities in ICS. Extensive security solutions
are proposed to eliminate vulnerabilities and increase ICS security. To the
best of our knowledge, none of them offered or established a security test-
bed, which is critical for assessing the security of ICS tools and products.
Mahdi Azimia et al. proposed a test-bed for evaluating the security of
industrial applications in industrial environments by offering several metrics
for static testing, dynamic testing, and network testing. In comparison to other
detection platforms, this platform thoroughly covers the ICS and gives metrics
for evaluations. Based on existing and current SCADA/DNP3 security
challenges, AAmir Shahzad and colleagues presented security solutions
(using cryptography implementations) to safeguard the communication
(SCADA/DNP3 protocol communication), and attack (abnormal) scenarios
were established within each test-bed implementation. The technique
efficiently compensates for the firewall's, DMZs', and IPsec SSL/lack TLS's of
performance.
Peng Jie and colleagues presented a type of distributed firewall that,
when compared to a typical boundary firewall, adds a protective layer among
internal subnets. When set configure, it may build multiple configurations for
each service object and fully account the operating applications and network
processing demand. The white list mechanism is used in firewall rule setup,
which makes dynamic assessments of behavior between the control network
and the information network. Except that, we should try our utmost to maintain
functional isolation and prevent malicious malware from spreading to other
production equipment by severely limiting inter-subnet connection.