Quoted from: “Intelligent Manufacturing Information Security Technology” (Authors: Qin Zhiguang, Nie Xuyun, Qin Zhen)
The book has been published, for details please see the end of this article~
「 1. Overview of Industrial Control Systems」
Industrial Control Systems (ICS) refer to a collective term for various types of control systems including monitoring and data acquisition systems and distributed control systems. With the continuous development of the Internet, the high degree of integration between information technology and industrialization has become an inevitable trend, leading to an increase in threats faced by industrial control systems.[1] Unlike traditional information systems, ICS not only faces traditional network attacks but also has specific attack methods at the physical layer due to its unique structural characteristics.
As a necessary infrastructure for the normal operation of society, industrial control systems are core facilities widely used in various social industries such as electricity, petroleum, natural gas, aviation, railways, transportation, and urban management. The consideration of their security is gradually receiving attention. From the consequences of attacks, their destructive power is no less than that of any traditional information system. Therefore, we need to establish a multi-faceted and deep protective system from various angles to ensure the long-term safe operation of control systems. The network diagram of industrial control systems is shown in Figure 1.[2].
Figure 1 Network Diagram of Industrial Control Systems

Figure 2 Threat Source Distribution Diagram
From the sources of threats, the first, second, third, and fifth points are uncontrollable and require comprehensive consideration of various factors such as personnel management in industrial control systems, the choice of operating systems, and the selection of locations for industrial control systems. External personnel targeting ICS mainly achieve this through network attacks. Unlike the CIA (Confidentiality, Integrity, and Availability) principle of traditional information systems, the security importance of industrial control systems is AIC (Availability > Integrity > Confidentiality). Additionally, specific attack methods exist for particular industrial systems due to their internal structures and network topologies, integrating multiple steps and techniques.[3] Below are some representative attack methods.
1) Replay Attacks
Replay attacks refer to attackers obtaining authentication credentials through network eavesdropping or other means and then sending these credentials to the target host to deceive the system. This process is mainly used in the identity authentication process and is relatively simple. However, due to the diversity of methods to obtain authentication credentials, replay attacks are still relatively difficult to prevent. Replay attacks are shown in Figure 3.

As shown in Figure 3, the attacker eavesdrops on the network to obtain the authentication information “Hello, Alice,” and then sends it repeatedly to the target server Alice, thus achieving the purpose of deceiving the target host.

3) Remote Modification of RTU Logic
The Remote Terminal Unit (RTU) is a remote operation unit used to control PLCs. This attack method primarily targets the availability of control systems. However, typically, the RTU is located in the local area network within the network topology. Thus, to modify the RTU logic, it is necessary to disguise as legitimate traffic and bypass firewalls before successfully modifying the RTU logic (Figure 5).
Figure 5 Remote Modification of RTU Logic
4) DoS Attacks

Advanced Persistent Threat (APT) was formally proposed in 2006, referring to organized, targeted, covert, highly destructive, and long-lasting new types of attacks and security threats using advanced attack means against specific targets.[4] The severity of the threat can be roughly divided into three types: the first type attacks using infective computer viruses, worms, etc.; the second type penetrates through exploiting software vulnerabilities, social emails, etc., to obtain direct benefits, with a clearer and more sustained target than the first type; the third type primarily targets infrastructure attacks and sensitive intelligence theft, with more significant strategic implications, and more comprehensive and covert network attack methods.
From the lifecycle of APT, APT attacks can be divided into several stages, including intelligence collection, early penetration, implanting malicious code, privilege escalation, command and control communication, lateral penetration, resource excavation, and disappearing without a trace. The APT lifecycle is shown in Figure 7.

SQL injection is defined as: attackers insert a series of SQL statements into the application through query operations to manipulate data. Its important feature is unauthorized access and direct retrieval from a database. Essentially, it exploits the syntax processing of SQL statements inputted in web applications, targeting the lack of strict checks and processing of parameters passed to SQL statements by web application developers.
SQL injection has the following characteristics: wide application range, low technical difficulty, and significant harm. A specific example of SQL injection is shown below.
Generally, web applications will have username and password parameters for user login. The program will look for the user table in the database to check whether the password matches the username. If the username is “admin” and the password is “123456”, then the SQL statement is as shown below: Select * from user where username=’admin’ and password=’smith’ If we do not strictly check the parameters, and use “admin’or 1=1 –” for username and “123456” for password, then the SQL statement will change to: Select * from user where username=’admin’ or 1=1– and password==’123456’ The “or” after “1=1” will always be true, and “–” will comment out the following statement, thus this statement will execute successfully even if the user does not know the password. |

8) Port Scanning
Port scanning is a technique to probe which services a server has open to the outside. Attackers typically use it as a necessary means of information gathering. The attacker sends probe packets to the target host’s service ports and records the target host’s response to determine whether the service ports are open or closed, thus identifying the specific services or information provided by the ports. Attackers can also capture the data flowing in and out of the server to monitor its operation and collect operational information for further network attacks.
The main techniques for port scanning include TCP connect scanning, TCP SYN scanning, TCP FIN scanning, TCP ACK scanning, IP range scanning, TCP reverse ident scanning, and window scanning, among others. Different scanning techniques should be employed for different servers, and the effectiveness of scanning will vary depending on the server.
Typically, servers can prevent port scanning attacks by closing idle and potentially dangerous ports and using firewalls to block ports exhibiting scanning symptoms. Specifically, this involves using firewalls to inspect each incoming data packet to the local computer, analyzing the traffic characteristics of the packets, and rejecting dangerous traffic from entering the local server to prevent port scanning.
References
[1] Xia Chunming, Liu Tao, Wang Huazhong, et al. Current Status and Development Trends of Information Security in Industrial Control Systems [J]. Information Security and Technology, 2013, 4(02): 13-18.
[2] Peng Yong, Jiang Changqing, Xie Feng, et al. Research Progress on Information Security in Industrial Control Systems [J]. Journal of Tsinghua University (Natural Science Edition), 2012, 52(10): 1396-1408.
[3] Liu Wei, Li Dong, Sun Bo. Security Analysis of Industrial Control Systems [J]. Information Network Security, 2012(08): 41-43.
[4] Chen Xingshu, Zeng Xuemei, Wang Wenxian, et al. Network Security and Intelligence Analysis Based on Big Data [J]. Engineering Science and Technology, 2017, 49(03): 1-12.



Scan to Follow Us
“Intelligent Manufacturing Garden”
Upholding the concept of “advanced manufacturing, strong manufacturing nation,”
Tsinghua Press provides the best knowledge services for everyone!