(19)
(11)EP 3 646 561 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
06.10.2021 Bulletin 2021/40

(21)Application number: 18823706.9

(22)Date of filing:  17.06.2018
(51)International Patent Classification (IPC): 
H04L 29/06(2006.01)
G06F 21/55(2013.01)
H04L 29/08(2006.01)
G05B 19/05(2006.01)
G06F 21/56(2013.01)
(52)Cooperative Patent Classification (CPC):
H04L 67/12; G06F 21/566; G06F 21/554; G05B 19/058; H04L 63/0209; H04L 63/1408
(86)International application number:
PCT/IB2018/054446
(87)International publication number:
WO 2019/003041 (03.01.2019 Gazette  2019/01)

(54)

A THREAT DETECTION SYSTEM FOR INDUSTRIAL CONTROLLERS

BEDROHUNGSERKENNUNGSSYSTEM FÜR INDUSTRIELLE STEUERUNGEN

SYSTÈME DE DÉTECTION DE MENACE POUR DISPOSITIFS DE COMMANDE INDUSTRIELS


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 28.06.2017 US 201762525760 P

(43)Date of publication of application:
06.05.2020 Bulletin 2020/19

(73)Proprietor: Si-Ga Data Security (2014) Ltd.
8470913 Beer-Sheva (IL)

(72)Inventors:
  • GENDELMAN, Ilan
    4692000 Arsuf-Kedem (IL)
  • SAMOILOFF, Amir
    84965 Omer (IL)

(74)Representative: Schmidt, Alexander 
Sonnenberg Harrison Partnerschaft mbB Herzogspitalstraße 10a
80331 München
80331 München (DE)


(56)References cited: : 
EP-A1- 3 179 323
US-A1- 2013 152 198
US-A1- 2016 050 225
KR-B1- 101 252 358
US-A1- 2014 189 860
  
  • KEN YAU ET AL: "PLC Forensics Based on Control Program Logic Change Detection", JOURNAL OF DIGITAL FORENSICS, SECURITY AND LAW, vol. 10, 1 January 2015 (2015-01-01), XP055754331, DOI: 10.15394/jdfsl.2015.1211
  
Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


Description

FIELD OF THE INVENTION



[0001] The present invention, in some embodiments thereof, relates to industrial control systems and, more specifically, but not exclusively, to monitoring of industrial control systems for security and maintenance.

BACKGROUND



[0002] Supervisory control and data acquisition (SCADA) systems, or any type of industrial control systems (ICSs), are where computer controlled systems interact with real-world processes by monitoring and controlling the analog and digital input and output from devices, such as pumps, valves, heaters, etc. ICSs are at the center of today's technological infrastructures. ICSs are used to control and monitor from the most crucial processes, such as infrastructures for power generation, electrical transmission grids, water distribution, and transportation control, down to low scale ventilation, heating, and gas control in public or private facilities.

[0003] ICSs are comprised of programmable logic controllers (PLCs), SCADA data networks, operator and supervisor terminals, management terminals, etc. The PLC devices are connected to physical devices, such as pumps, meters, valves, heaters, etc. and control these physical devices using hardware interfaces, such as analog and/or digital input and/or output (I/O) electrical conductor lines, referred to herein as I/O lines. The PLCs frequently use a system bus design to attach I/O modules to the PLC processing unit, and the I/O modules contain electronics to control the output conductors and perform measurements on the input conductors. By manipulating the I/O lines in a certain order, the operation of the facility is implemented. The physical devices are operated by the PLC according to embedded logic, and each PLC is designed to work autonomously, often in groups where each PLC might control part of the process. Select information and statuses gathered by the PLCs are transferred to operator and/or supervisor terminals who have limited control of the operations according to predefined constraints, such as manual overrides of certain devices and/or operations when needed. Higher level information is transferred to management terminals for executive monitoring of the operations.

[0004] ICSs may be described as control systems where most of the logic is performed on the level of the PLCs, which have exclusive real world connection to the physical devices. The PLC's operational logic runs automatically in real time till the logic is changed, parameters are changed, or a manual override is sent from a control terminal. ICSs are designed to provide high reliability and environmental protection, and major efforts were done to reach high values of mean time between failures (MTBF). Hence the control systems were designed to be robust, autonomous, and easily overridden by the operator and/or programmer when needed.

[0005] Current security techniques for ICS include network level security using firewalls, internet packet diodes and high security level password protected gateways. These security techniques are designed to prevent unauthorized access through the internet.

[0006] Cyber security is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide or the tasks they should perform. Cyber security includes controlling physical access to the hardware, as well as protecting against harm that might come via network access, data and code injection.

[0007] Cyber security is attained by the use of three main processes: prevention, detection and response.

[0008] Prevention systems attempt to detect a threat before any damage is done.

[0009] Detection systems attempt to detect any damage, disruption or misdirection and e.g., alert.

[0010] Reaction systems intended to react to threats upon detection.

[0011] Document XP055754331 relates to PLC Forensics Based on Control Program Logic Change Detection. A program called CPLCD runs on a PC. This program is configured with a set of detection rules (DRs) to be able to detect when the programming logic of a PLC has been altered by an unauthorized person. To define these rules, each ladder logic (i.e. the PLC's algorithm) is transformed into boolean expressions in order to determine an expected result based on the values of a set of variables in the memory (i.e. based on a specific input). The CPLCD then reads the actual values of these variables from the memory of the PLC and calculates the expected result based on the DRs. If the actual result in the PLC is different from the expected result, it means that the programming logic of the PLC has been altered.

[0012] Document EP3179323 discloses systems and methods of detecting whether an attacker has re-programmed a Programmable Logic Controller (PLC) in a Supervisory Control And Data Acquisition (SCADA) system in order to send false information back to the Human Machine Interface (HMI).

[0013] Document KR101252358B discloses a PLC command test device and method to reduce costs and time for testing a PLC command by automatically testing a PLC command error

SUMMARY



[0014] According to an aspect of the present invention there is provided a threat detection system for industrial controllers, comprising: at least one Programmable Logic Controller (PLC); at least one physical device connected with the PLC; a Deterministic Fictitious Programmable Logic Controller (DFPLC) deterministically programmed to respond with at least one predetermined signal to at least one input signal received; and a monitoring unit connected with the DFPLC; the DFPLC disguised as a PLC; and the monitoring unit configured to send at least one input signal to the DFPLC, receive at least one response from the DFPLC and communicate at least one alert upon the at least one response being other than an expected response according to the deterministic programming of the DFPLC.

[0015] According to another aspect of the present invention there is provided an industrial control system, comprising: an information technology (IT) layer connected to the internet; a DeMilitarized Zone (DMZ) layer connected with the IT layer; and an operational technology (OT) layer connected with the DMZ layer; the OT layer comprises the threat detection system for industrial controllers described above. According to another aspect of the present invention there is provided a method of detecting threats in industrial systems, comprising: sending, by a monitoring unit, at least one input signal to a Deterministic Fictitious Programmable Logic Controller (DFPLC) deterministically programmed to respond with at least one predetermined signal to at least one input signal received; the DFPLC disguised as a PLC; receiving, by the monitoring unit at least one response from the DFPLC; and providing, by the monitoring unit, at least one alert upon the at least one response being other than an expected response according to the deterministic programming of the DFPLC.

BRIEF DESCRIPTION OF THE DRAWINGS



[0016] For better understanding of the invention and to show how the same may be carried into effect, reference will now be made, purely by way of example, to the accompanying drawings.

[0017] With specific reference now to the drawings in detail, it is stressed that the particulars shown are by way of example and for purposes of illustrative discussion of the preferred embodiments of the present invention only, and are presented in the cause of providing what is believed to be the most useful and readily understood description of the principles and conceptual aspects of the invention. In this regard, no attempt is made to show structural details of the invention in more detail than is necessary for a fundamental understanding of the invention, the description taken with the drawings making apparent to those skilled in the art how the several forms of the invention may be embodied in practice. In the accompanying drawings:

Fig. 1 is a schematic view of an exemplary existing industrial control system;

Fig. 2 is a schematic view of the system of Fig. 1 with the Deterministic Fictitious PLC (DFPLC) and the monitoring unit according to embodiments of the present invention; and

Fig. 3 is a flowchart showing the process performed by the DFPLC and the monitoring unit according to embodiments of the invention.


DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS



[0018] Before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not necessarily limited in its application to the details of construction and the arrangement of the components and/or methods set forth in the following description and/or illustrated in the drawings and/or the Examples. The invention is capable of other embodiments or of being practiced or carried out in various ways.

[0019] As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit," "module" or "system." Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.

[0020] Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.

[0021] A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.

[0022] Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wire line, optical fiber cable, RF, etc., or any suitable combination of the foregoing.

[0023] Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).

[0024] Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

[0025] These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

[0026] The present invention, in some embodiments thereof, relates to a detection layer for monitoring industrial control systems (ICS).
Since the whole historical design concepts of ICS were not security oriented, a set of misconceptions, such as security through obscurity and/or physical layer protection have led to an erroneous sense of security by ICS managers. Such security measures do not prevent access to the PLCs. Beyond physical security access, such as locked control boxes, there are no security measures or monitoring at the PLC level of ICSs. Thus there exists an urgent security risk, and the mitigation of this risk is the goal of some aspects of the embodiments of the invention.

[0027] The enormous potential damage combined with embedded vulnerabilities make ICS high profile targets for malicious attacks. Critical national infrastructural damage will affect directly the public health and safety, and is a high profile target and threat to homeland security. The install base of ICSs is extremely large and mostly defenseless, eager for security solutions. The industry cannot afford to replace and/or upgrade existing control systems to comply with the threats and/or upcoming changes in regulations. Any monitoring system that offers to secure existing hardware will have an advantage.

[0028] ICSs were designed to be highly reliable and operate in extreme environmental conditions, such as temperature, humidity, vibration, etc. This results in a very conservative industry, very careful and slow to adopt new technologies or changes. In addition the cost of replacing ICS hardware is extremely high. Any monitoring system needs to overlay the existing control systems, offering a full solution for existing hardware without interrupting operations or requiring control system changes.
ICSs are considered, incorrectly, as inherently secure, and only recently have their vulnerabilities become a growing source of concern. For example, the Stuxnet viruses to attack the Iranian nuclear fuel production infrastructure, or the breach of the Maroochy Water Services in Queensland, Australia. Therefore the security solutions for ICS, unlike those for information technology (IT) networks, are in an early stage of development and most current solutions are migrated solutions from the IT world that protect against unauthorized access from the internet. These solutions and approaches for securing an ICS network are focused on the communication layers and gateways, and not the PLC internal and/or external hardware interfaces. Unlike IT systems, ICSs have defined endpoint interactions with real world processes through hardware input and/or output (I/O) lines, resulting in clear operational outcomes. When the hardware interfaces are affected by an attack, the cyber defense may fail and might or might not detect the violation. Therefore, the critical defense point, and last line of defense, is the hardware interface between the PLC and the real world processes.

[0029] Most existing solutions are supplied by the PLC manufacturers and require a vast and extremely costly hardware upgrades. Existing solutions are tailor made for each manufacturer, model, and/or protocol, requiring integration per each different product line, and for any future products.

[0030] The present invention provides a cost effective solution for maintaining ICS security.

[0031] According to some embodiments of the present invention there is provided a monitoring system, which may comprise a method, a monitoring unit and a Deterministic Fictitious PLC (DFPLC), comprising a deterministic program logic, i.e. input X to the DFPLC may only result in output Y. The combined hardware devices and software methods may monitor and identify cyber-attacks and/or any abnormal operation in industrial control systems (ICSs) and/or supervisory control and data acquisition (SCADA) systems. The monitoring unit connected to the DFPLC may receive data from the DFPLC system bus and/or I/O lines. During monitoring, received operation data may be processed for anomaly. Based on the calculated anomalies, alerts may be sent to the appropriate response personnel of the ICS. This approach may result in protection of critical ICS operations with minimal infrastructure changes.

[0032] Occasionally, when a malicious entity wishes to do damage, it penetrates some of the system's Programmable Logic Controllers (PLCs) and changes their instructions (commands and/or parameters). It is very common that attackers try to penetrate into many PLCs and do minor changes thus, there is a high probability that the DFPLC will be "touched" and then even the tiniest change will result with an alert.

[0033] Additionally, in some cases the malicious entity reports back that everything is working properly. That way, once the malicious entity penetrates the prevention layer of the system, with no detection system, it may continue harming the system for a long time, until detected, if detected, through faulty system operation.

[0034] Fig. 1 is a schematic view of an exemplary existing industrial control system 100, comprising: an information technology (IT) layer 120 connected to the internet 110, a DeMilitarized Zone (DMZ) layer 130 which serves as a prevention layer and is connected with the IT layer 120, an operational technology (OT) layer 140 connected with the DMZ layer 130 and comprising at least one Programmable Logic Controller (PLC) 160A-160N and at least one physical device 170A-170N, such as pumps, meters, valves, heaters, robots, actuators, etc. each connected to its respective PLC ,e.g., via the PLC's I/O lines.

[0035] It will be appreciated that more than one physical device may be connected to a single PLC.

[0036] It will be appreciated that the IT layer 120 may be connected to the internet 110 via a firewall.

[0037] The IT layer 120 comprises any networking, storage, computers and other physical devices, processes and infrastructure to store, process, create, secure and exchange all forms of electronic data.

[0038] The DMZ layer 130 is a physical or logical sub network that contains and exposes the system's external-facing services to the Internet. The purpose of a DMZ is to add an additional layer of security to the system. An external network node can access only what is exposed in the DMZ, while the rest of the system's network is firewalled.

[0039] The OT layer 140 comprises hardware and software for detecting, controlling and/or regulating system processes and physical devices such as pumps, valves, etc. The OT layer comprises systems that process operational data including computer systems, electronics, telecommunications, technical components, etc. and may be intended to control physical devices, e.g., open a valve, activating an engine, etc. and/or regulate various process values such as pressure or temperature, etc.

[0040] According to embodiments of the present invention, the OT layer may include a Human Machine Interface (HMI) used to monitor and control the system's technical processes.

[0041] Fig. 2 is a schematic view of the system of Fig. 1 with the Deterministic Fictitious PLC (DFPLC) 200 and the monitoring unit 210 according to embodiments of the present invention. The DFPLC 200 is connected as one of the system's PLCs and disguised as one of them. On its other end, the DFPLC is connected with the monitoring unit 210 which monitors the DFPLC's activity. The DFPLC 200 receives a flow of incoming factitious sensors' signals (e.g., via its I/O lines) from the monitoring unit 210, which in return expects to receive back from the DFPLC corresponding signals (predetermined), consistent with its deterministic programming. Since the monitoring unit 210 expects specific signals in response to each input or inputs set sent to the DFPLC 200, it is able to detect if a malicious entity tries to change the DFPLC's performance, i.e., logic and/or parameters. The DFPLC 200 acts as one of the regular PLCs (160A-160N) by running its logic based on the inputs sent by the monitoring unit 210 and responding with signals accordingly in order to blend among the regular PLCs and not be detected as a fictitious PLC.

[0042] Thus, any attack intended to manipulate or harm the DFPLC's logic, i.e. program commands and/or parameters, may be detected by the monitoring unit 210 and reported either by wired or wireless connection to the client by an email, a phone call, an alert notification, the HMI, etc.

[0043] It will be appreciated that the DFPLC 200 and the monitoring unit 210 of the present invention may be installed in a system comprising more or less components than the ones presented in Figs. 1 and 2. To clarify, the internet 110, the IT layer 120 and the DMZ 130 are optional and presented for the purpose of demonstration of an exemplary system. The mandatory components of the present invention are the OT layer 140 including at least the DFPLC 200 and the monitoring unit 210 of the present invention. Fig. 3 is a flowchart showing the process performed by the DFPLC 200 and the monitoring unit 210 according to embodiments of the invention. In step 310 the monitoring unit 210 sends an input signal(s) to the DFPLC 210 and expects a specific output signal(s) as a response(s). If in step 320 the DFPLC 210 responds as expected, the process loops back to step 310. Otherwise, in step 330 the monitoring unit 210 alerts.

[0044] It will be appreciated by persons skilled in the art that the present invention is not limited to what has been particularly shown and described hereinabove. Rather the scope of the present invention is defined by the appended claims.


Claims

1. A threat detection system for industrial controllers, comprising:

at least one Programmable Logic Controller, PLC (160A-160N);

at least one physical device connected with said PLC;

a Deterministic Fictitious Programmable Logic Controller, DFPLC (200), comprising a deterministic program logic; said DFPLC deterministically programmed and configured to receive at least one input signal and respond with at least one predetermined signal according to said logic; and

a monitoring unit (210) connected with said DFPLC (200);

said DFPLC (200) disguised as a PLC; and

said monitoring unit (210) configured to send at least one input signal to

said DFPLC (200), receive at least one response from said DFPLC (200) and

communicate at least one alert upon said at least one response being other than an expected response according to said deterministic programming of said DFPLC (200).


 
2. An industrial control system, comprising:

an information technology, IT, layer (120) connected to the internet;

a DeMilitarized Zone, DMZ, layer (130) connected with said IT layer; and

an operational technology, OT, layer (140) connected with said DMZ layer (130); said OT layer (140) comprises the threat detection system for industrial controllers of claim 1.


 
3. A method of detecting threats in industrial systems, comprising:

sending, by a monitoring unit (210), at least one input signal to a Deterministic Fictitious Programmable Logic Controller, DFPLC (200), comprising a deterministic program logic; said DFPLC (200) deterministically programmed and configured to receive at least one input signal and respond with at least one predetermined signal according to said logic ;

said DFPLC (200) disguised as a PLC; receiving, by said monitoring unit (210) at least one response from said DFPLC (200);

and providing, by said monitoring unit (210), at least one alert upon said at least one response being other than an expected response according to said deterministic programming of said DFPLC (200).


 


Ansprüche

1. Bedrohungserkennungssystem für industrielle Steuerungen, umfassend:

zumindest eine speicherprogrammierbare Steuerung, PLC (160A-160N);

zumindest eine physische Vorrichtung, die mit der PLC verbunden ist;

eine deterministische fiktive speicherprogrammierbare Steuerung, DFPLC (200), die eine deterministische Programmlogik umfasst, wobei die DFPLC deterministisch programmiert ist und eingerichtet ist, um mindestens ein Eingangssignal zu empfangen und mit mindestens einem vorbestimmten Signal gemäß der Logik zu antworten; und

eine Überwachungseinheit (210), die mit der DFPLC (200) verbunden ist, wobei die DFPLC (200) als eine SPS getarnt ist und die Überwachungseinheit (210) eingerichtet ist, um mindestens ein Eingangssignal an die DFPLC (200) zu senden, mindestens eine Antwort von der DFPLC (200) zu empfangen und mindestens eine Warnung zu übermitteln, wenn die mindestens eine Antwort von einer erwarteten Antwort gemäß der deterministischen Programmierung der DFPLC (200) abweicht.


 
2. Industrielles Steuersystem, umfassend:

eine mit dem Internet verbundene Informationstechnologie-, IT, Schicht (120);

eine mit der IT-Schicht verbundene DeMilitarized Zone-,DMZ, Schicht (130); und

eine Betriebstechnologie-, OT, Schicht (140), die mit der DMZ-Schicht (130) verbunden ist, wobei die OT-Schicht (140) das Bedrohungserkennungssystem für industrielle Steuerungen nach Anspruch 1 umfasst.


 
3. Verfahren zur Erkennung von Bedrohungen in industriellen Systemen, umfassend:

Senden, durch eine Überwachungseinheit (210), mindestens eines Eingangssignals an eine deterministische fiktive speicherprogrammierbare Steuerung, DFPLC (200), die eine deterministische Programmlogik umfasst, wobei die DFPLC (200) deterministisch programmiert ist und eingerichtet ist, um mindestens ein Eingangssignal zu empfangen und mit mindestens einem vorbestimmten Signal gemäß der Logik zu antworten und wobei die DFPLC (200) als eine SPS getarnt ist;

Empfangen, durch die Überwachungseinheit (210), mindestens einer Antwort von der DFPLC (200); und

Bereitstellen, durch die Überwachungseinheit (210), mindestens einer Warnung, wenn die mindestens eine Antwort von einer erwarteten Antwort gemäß der deterministischen Programmierung der DFPLC (200) abweicht.


 


Revendications

1. Système de détection de menaces pour contrôleurs industriels, comprenant :

au moins un contrôleur logique programmable PLC (160A-160N) ;

au moins un dispositif physique connecté audit PLC ;

un contrôleur logique programmable fictif déterministe DFPLC (200) comprenant une logique de programme déterministe ; ledit DFPLC étant programmé de manière déterministe et configuré pour recevoir au moins un signal d'entrée et répondre avec au moins un signal prédéterminé selon ladite logique ; et

une unité de surveillance (210) connectée audit DFPLC (200) ;

ledit DFPLC (200) est déguisé en un PLC; et

ladite unité de surveillance (210) est configurée pour envoyer au moins un signal d'entrée audit DFPLC (200), recevoir au moins une réponse dudit DFPLC (210) et communiquer au moins une alerte dès que ladite au moins une réponse est différente d'une réponse attendue selon ladite programmation déterministe dudit DFPLC (200).


 
2. Système de contrôle industriel, comprenant :

une couche de technologie de l'information IT (120) connectée à l'Internet ;

une couche de zone démilitarisée DMZ (130) connectée à ladite couche IT ; et

une couche de technologie opérationnelle OT (140) connectée à ladite couche DMZ (130); ladite couche OT (140) comprend le système de détection de menaces pour contrôleurs industriels de la revendication 1.


 
3. Procédé de détection de menaces dans des systèmes industriels, comprenant :

l'envoi, par une unité de surveillance (210), d'au moins un signal d'entrée à un contrôleur logique programmable fictif déterministe DFPLC (200) comprenant une logique de programme déterministe ; ledit DFPLC étant programmé de manière déterministe et configuré pour recevoir au moins un signal d'entrée et répondre avec au moins un signal prédéterminé selon ladite logique ;

ledit DFPLC (200) étant déguisé en un PLC ;

la réception, par ladite unité de surveillance (210), d'au moins une réponse dudit DFPLC (200) ; et la fourniture, par ladite unité de surveillance (210), d'au moins une alerte dès que ladite au moins une réponse est différente d'une réponse attendue selon ladite programmation déterministe dudit DFPLC (200).


 




Drawing














Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description