Demilitarized network to secure the data stored in industrial networks
Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all...
- Autores:
-
Nuñez Alvarez, José R.
Zamora Pérez, Yelena
Benitez Pina, Israel Francisco
NORIEGA ANGARITA, ELIANA MARIA
- Tipo de recurso:
- http://purl.org/coar/resource_type/c_816b
- Fecha de publicación:
- 2020
- Institución:
- Corporación Universidad de la Costa
- Repositorio:
- REDICUC - Repositorio CUC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.cuc.edu.co:11323/7303
- Acceso en línea:
- https://hdl.handle.net/11323/7303
https://repositorio.cuc.edu.co/
- Palabra clave:
- Control system
Demilitarized network
Electrical network
Firewalls
Industrial network
- Rights
- closedAccess
- License
- Attribution-NonCommercial-NoDerivatives 4.0 International
id |
RCUC2_e1514158279e8e59dbd6d41ec643603b |
---|---|
oai_identifier_str |
oai:repositorio.cuc.edu.co:11323/7303 |
network_acronym_str |
RCUC2 |
network_name_str |
REDICUC - Repositorio CUC |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Demilitarized network to secure the data stored in industrial networks |
title |
Demilitarized network to secure the data stored in industrial networks |
spellingShingle |
Demilitarized network to secure the data stored in industrial networks Control system Demilitarized network Electrical network Firewalls Industrial network |
title_short |
Demilitarized network to secure the data stored in industrial networks |
title_full |
Demilitarized network to secure the data stored in industrial networks |
title_fullStr |
Demilitarized network to secure the data stored in industrial networks |
title_full_unstemmed |
Demilitarized network to secure the data stored in industrial networks |
title_sort |
Demilitarized network to secure the data stored in industrial networks |
dc.creator.fl_str_mv |
Nuñez Alvarez, José R. Zamora Pérez, Yelena Benitez Pina, Israel Francisco NORIEGA ANGARITA, ELIANA MARIA |
dc.contributor.author.spa.fl_str_mv |
Nuñez Alvarez, José R. Zamora Pérez, Yelena Benitez Pina, Israel Francisco NORIEGA ANGARITA, ELIANA MARIA |
dc.subject.spa.fl_str_mv |
Control system Demilitarized network Electrical network Firewalls Industrial network |
topic |
Control system Demilitarized network Electrical network Firewalls Industrial network |
description |
Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as the most appropriate for our application, since it allows efficient exchange of data guaranteeing security and avoiding the violation of the control system. Finally, the simulation of the proposed network is carried out. |
publishDate |
2020 |
dc.date.accessioned.none.fl_str_mv |
2020-11-13T16:01:10Z |
dc.date.available.none.fl_str_mv |
2020-11-13T16:01:10Z |
dc.date.issued.none.fl_str_mv |
2020 |
dc.type.spa.fl_str_mv |
Pre-Publicación |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_816b |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/preprint |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ARTOTR |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
format |
http://purl.org/coar/resource_type/c_816b |
status_str |
acceptedVersion |
dc.identifier.issn.spa.fl_str_mv |
20888708 |
dc.identifier.uri.spa.fl_str_mv |
https://hdl.handle.net/11323/7303 |
dc.identifier.instname.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.identifier.reponame.spa.fl_str_mv |
REDICUC - Repositorio CUC |
dc.identifier.repourl.spa.fl_str_mv |
https://repositorio.cuc.edu.co/ |
identifier_str_mv |
20888708 Corporación Universidad de la Costa REDICUC - Repositorio CUC |
url |
https://hdl.handle.net/11323/7303 https://repositorio.cuc.edu.co/ |
dc.language.iso.none.fl_str_mv |
eng |
language |
eng |
dc.relation.references.spa.fl_str_mv |
[1] A. Loulijat, et al., “DFIG use with combined strategy in case of failure of wind farm,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2221-2234, 2019. [2] S. Maity, et al., “Formal integrated network security analysis tool: Formal query-based network security configuration analysis,” IET Networks, vol. 4, no. 2, pp. 137-147, 2015. [3] K. Dadheech, et al., “De-Militarized Zone: A Next Level to Network Security,” in Proceedings of the International Conference on Inventive Communication and Computational Technologies (ICICCT 2018), pp. 595-600, 2018. [4] M. G. I. Cedeño, et al., “Sizing of a networked self-consumption system at the Technical University of Manabí, Ecuador,” in CISCI 2019 Decima Octava Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Decimo Sexto Simposium Iberoamericano en Edu., Cibernetica e Informatica-Memorias, vol. 1, pp. 6-11, 2019. [5] Y. Li, et al., “Complex networks in advanced manufacturing systems,” Journal of Manufacturing Systems, vol. 43, no. 3, pp. 409-421, 2017. [6] V. Varadharajan, et al., “A policy-based security architecture for software-defined networks,” IEEE Transaction on Information Forensics and Security, vol. 14, no. 4, pp. 897-912, 2019. [7] I. Ahmad, et al., “Security in Software Defined Networks: A Survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2317-2346, 2015. [8] Z. Chen, et al., “Collaborative network security in multi-tenant data center for cloud computing,” Tsinghua Science and Technology, vol. 19, no. 1, pp. 82-94, 2014. [9] J. García, et al., “Reconfigurable distributed network control system for industrial plant automation,” IEEE Transaction on Industrial Electronics, vol. 51, no. 6, pp. 1168-1180, 2004. [10] P. Tenti and T. Caldognetto, “Optimal control of Local Area Energy Networks (E-LAN),” Sustainable Energy, Grids and Networks, vol. 14, pp. 12-24, 2018. [11] J. Neeli and N. K. Cauvery, “Trust-based secure routing against lethal behavior of nodes in wireless adhoc network,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1592-1598, 2020. [12] J. R. Núñez A., et al., “Metodología de diagnóstico de fallos para sistemas fotovoltaicos de conexión a red,” Revista Iberoamericana de Automática e Informática Industrial, vol. 17, no. 1, p. 94, 2020. [13] J. Aguilar, et al., “Sistemas MultiAgentes y sus Aplicaciones en Automatizací on Industrial,” Universidad de Los Andes, Merida, Venezuela, 2013. [14] H. Hosseinian, et al., “Blockchain outlook for deployment of IoT in distribution networks and smart homes,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2787-2796, 2020. [15] D. Vuksanović, et al., “Industry 4.0: the Future Concepts and New Visions of Factory of the Future Development,” International Scientific Conference on Ictand E-Business Related Research (SINTEZA 2016), pp. 293-298, 2016. [16] C. G. Machado, et al., “Sustainable manufacturing in Industry 4.0: an emerging research agenda,” International Journal of Production Research, vol. 58, no. 5, pp. 1462-1484, 2020. [17] J. Zhang, et al., “Improved minimum entropy control for two-input and two-output networked control systems,” in 2016 UKACC International Conference on Control, UKACC Control 2016, 2016. [18] M. E. M. B. Gaid, et al., “Optimal integrated control and scheduling of networked control systems with communication constraints: Application to a car suspension system,” IEEE Transactions on Control Systems Technology, vol. 14, no. 4, pp. 776-787, 2006. [19] B. Rahmani and A. H. D. Markazi, “Variable selective control method for networked control systems,” IEEE Transactions on Control Systems Technology, vol. 21, no. 3, pp. 975-982, 2013. [20] J. Nuñez, et al., “Tools for the Implementation of a SCADA System in a Desalination Process,” IEEE Latin America Transactions, vol. 17, no. 11, pp. 1858-1864, 2019. [21] S. McLaughlin, et al., “The Cybersecurity Landscape in Industrial Control Systems,” Proceedings of the IEEE, vol. 104, no. 5, pp. 1039-1057, 2016. [22] P. T. Tin, et al., “Hybrid protocol for wireless EH network over weibull fading channel: Performance analysis,” International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp. 1085-1091, 2020. [23] K. Liu, et al., “Survey on time-delay approach to networked control,” Annual Reviews in Control, vol. 48, pp. 57-79, 2019. [24] S. Amin, et al., “Security of interdependent and identical networked control systems,” Automatica, vol. 49, no. 1, pp. 186-192, 2013. [25] E. Henriksson, et al., “Multiple-Loop Self-Triggered Model Predictive Control for Network Scheduling and Control,” IEEE Transactions on Control Systems Technology, vol. 23, no. 6, pp. 2167-2181, 2015. [26] J. Ponniah, et al., “A clean slate approach to secure wireless networking,” Foundations and Trends in Networking, vol. 9, no. 1, pp. 1-105, 2015. [27] J. Zhu, et al., “Review and big data perspectives on robust data mining approaches for industrial process modeling with outliers and missing data,” Annual Reviews in Control, vol. 46, pp. 107-133, 2018. [28] A. Mungekar, et al., “Augmentation of a SCADA based firewall against foreign hacking devices,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1359-1366, 2020. [29] C. Shen, et al., “Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks,” IEEE Wireless Communications, vol. 25, no. 6, pp. 26-31, 2018. [30] Y. S. Jeong and J. H. Park, “Artificial intelligence for the fourth industrial revolution,” Journal of Information Processing Systems, vol. 14, no. 6, pp. 1301-1306, 2018. [31] F. A. Budes, et al., “Energy, economic, and environmental evaluation of a proposed solar-wind power on-grid system using HOMER Pro®: A case study in Colombia,” Energies, vol. 13, no. 7, p. 1662, 2020 |
dc.rights.spa.fl_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 International |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/closedAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_14cb |
rights_invalid_str_mv |
Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/ http://purl.org/coar/access_right/c_14cb |
eu_rights_str_mv |
closedAccess |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.source.spa.fl_str_mv |
International Journal of Electrical and Computer Engineering |
institution |
Corporación Universidad de la Costa |
dc.source.url.spa.fl_str_mv |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091185749&doi=10.11591%2fijece.v11i1.pp611-619&partnerID=40&md5=da7e96b150001ed80e1be1c6c44f5e2c |
bitstream.url.fl_str_mv |
https://repositorio.cuc.edu.co/bitstreams/51877967-cd65-42c0-8f8d-a0266c3c0ecb/download https://repositorio.cuc.edu.co/bitstreams/475e914b-27aa-4928-88ff-249733c451e4/download https://repositorio.cuc.edu.co/bitstreams/30c99bf4-d9db-4cde-8e98-bb59a3110512/download https://repositorio.cuc.edu.co/bitstreams/eab33387-4b1c-4d6a-99bb-397de09c4210/download https://repositorio.cuc.edu.co/bitstreams/e886176e-957d-4800-abdd-64c258da74b9/download |
bitstream.checksum.fl_str_mv |
6dff7a862ab302b03db5e1d22cd7960d 4460e5956bc1d1639be9ae6146a50347 e30e9215131d99561d40d6b0abbe9bad f5fe3fd0aeed806aed7033d7fe4e38c3 750d6ebeb4e539ef854eea53fa27ecc5 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio de la Universidad de la Costa CUC |
repository.mail.fl_str_mv |
repdigital@cuc.edu.co |
_version_ |
1811760753127981056 |
spelling |
Nuñez Alvarez, José R.Zamora Pérez, YelenaBenitez Pina, Israel FranciscoNORIEGA ANGARITA, ELIANA MARIA2020-11-13T16:01:10Z2020-11-13T16:01:10Z202020888708https://hdl.handle.net/11323/7303Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as the most appropriate for our application, since it allows efficient exchange of data guaranteeing security and avoiding the violation of the control system. Finally, the simulation of the proposed network is carried out.Nuñez Alvarez, José R.Zamora Pérez, YelenaBenitez Pina, Israel Francisco-will be generated-orcid-0000-0003-2359-9768-600NORIEGA ANGARITA, ELIANA MARIA-will be generated-orcid-0000-0003-4580-2050-600application/pdfengCorporación Universidad de la CostaAttribution-NonCommercial-NoDerivatives 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/closedAccesshttp://purl.org/coar/access_right/c_14cbInternational Journal of Electrical and Computer Engineeringhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85091185749&doi=10.11591%2fijece.v11i1.pp611-619&partnerID=40&md5=da7e96b150001ed80e1be1c6c44f5e2cControl systemDemilitarized networkElectrical networkFirewallsIndustrial networkDemilitarized network to secure the data stored in industrial networksPre-Publicaciónhttp://purl.org/coar/resource_type/c_816bTextinfo:eu-repo/semantics/preprinthttp://purl.org/redcol/resource_type/ARTOTRinfo:eu-repo/semantics/acceptedVersion[1] A. Loulijat, et al., “DFIG use with combined strategy in case of failure of wind farm,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2221-2234, 2019.[2] S. Maity, et al., “Formal integrated network security analysis tool: Formal query-based network security configuration analysis,” IET Networks, vol. 4, no. 2, pp. 137-147, 2015.[3] K. Dadheech, et al., “De-Militarized Zone: A Next Level to Network Security,” in Proceedings of the International Conference on Inventive Communication and Computational Technologies (ICICCT 2018), pp. 595-600, 2018.[4] M. G. I. Cedeño, et al., “Sizing of a networked self-consumption system at the Technical University of Manabí, Ecuador,” in CISCI 2019 Decima Octava Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Decimo Sexto Simposium Iberoamericano en Edu., Cibernetica e Informatica-Memorias, vol. 1, pp. 6-11, 2019.[5] Y. Li, et al., “Complex networks in advanced manufacturing systems,” Journal of Manufacturing Systems, vol. 43, no. 3, pp. 409-421, 2017.[6] V. Varadharajan, et al., “A policy-based security architecture for software-defined networks,” IEEE Transaction on Information Forensics and Security, vol. 14, no. 4, pp. 897-912, 2019.[7] I. Ahmad, et al., “Security in Software Defined Networks: A Survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2317-2346, 2015.[8] Z. Chen, et al., “Collaborative network security in multi-tenant data center for cloud computing,” Tsinghua Science and Technology, vol. 19, no. 1, pp. 82-94, 2014.[9] J. García, et al., “Reconfigurable distributed network control system for industrial plant automation,” IEEE Transaction on Industrial Electronics, vol. 51, no. 6, pp. 1168-1180, 2004.[10] P. Tenti and T. Caldognetto, “Optimal control of Local Area Energy Networks (E-LAN),” Sustainable Energy, Grids and Networks, vol. 14, pp. 12-24, 2018.[11] J. Neeli and N. K. Cauvery, “Trust-based secure routing against lethal behavior of nodes in wireless adhoc network,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1592-1598, 2020.[12] J. R. Núñez A., et al., “Metodología de diagnóstico de fallos para sistemas fotovoltaicos de conexión a red,” Revista Iberoamericana de Automática e Informática Industrial, vol. 17, no. 1, p. 94, 2020.[13] J. Aguilar, et al., “Sistemas MultiAgentes y sus Aplicaciones en Automatizací on Industrial,” Universidad de Los Andes, Merida, Venezuela, 2013.[14] H. Hosseinian, et al., “Blockchain outlook for deployment of IoT in distribution networks and smart homes,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2787-2796, 2020.[15] D. Vuksanović, et al., “Industry 4.0: the Future Concepts and New Visions of Factory of the Future Development,” International Scientific Conference on Ictand E-Business Related Research (SINTEZA 2016), pp. 293-298, 2016.[16] C. G. Machado, et al., “Sustainable manufacturing in Industry 4.0: an emerging research agenda,” International Journal of Production Research, vol. 58, no. 5, pp. 1462-1484, 2020.[17] J. Zhang, et al., “Improved minimum entropy control for two-input and two-output networked control systems,” in 2016 UKACC International Conference on Control, UKACC Control 2016, 2016.[18] M. E. M. B. Gaid, et al., “Optimal integrated control and scheduling of networked control systems with communication constraints: Application to a car suspension system,” IEEE Transactions on Control Systems Technology, vol. 14, no. 4, pp. 776-787, 2006.[19] B. Rahmani and A. H. D. Markazi, “Variable selective control method for networked control systems,” IEEE Transactions on Control Systems Technology, vol. 21, no. 3, pp. 975-982, 2013.[20] J. Nuñez, et al., “Tools for the Implementation of a SCADA System in a Desalination Process,” IEEE Latin America Transactions, vol. 17, no. 11, pp. 1858-1864, 2019.[21] S. McLaughlin, et al., “The Cybersecurity Landscape in Industrial Control Systems,” Proceedings of the IEEE, vol. 104, no. 5, pp. 1039-1057, 2016.[22] P. T. Tin, et al., “Hybrid protocol for wireless EH network over weibull fading channel: Performance analysis,” International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp. 1085-1091, 2020.[23] K. Liu, et al., “Survey on time-delay approach to networked control,” Annual Reviews in Control, vol. 48, pp. 57-79, 2019.[24] S. Amin, et al., “Security of interdependent and identical networked control systems,” Automatica, vol. 49, no. 1, pp. 186-192, 2013.[25] E. Henriksson, et al., “Multiple-Loop Self-Triggered Model Predictive Control for Network Scheduling and Control,” IEEE Transactions on Control Systems Technology, vol. 23, no. 6, pp. 2167-2181, 2015.[26] J. Ponniah, et al., “A clean slate approach to secure wireless networking,” Foundations and Trends in Networking, vol. 9, no. 1, pp. 1-105, 2015.[27] J. Zhu, et al., “Review and big data perspectives on robust data mining approaches for industrial process modeling with outliers and missing data,” Annual Reviews in Control, vol. 46, pp. 107-133, 2018.[28] A. Mungekar, et al., “Augmentation of a SCADA based firewall against foreign hacking devices,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1359-1366, 2020.[29] C. Shen, et al., “Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks,” IEEE Wireless Communications, vol. 25, no. 6, pp. 26-31, 2018.[30] Y. S. Jeong and J. H. Park, “Artificial intelligence for the fourth industrial revolution,” Journal of Information Processing Systems, vol. 14, no. 6, pp. 1301-1306, 2018.[31] F. A. Budes, et al., “Energy, economic, and environmental evaluation of a proposed solar-wind power on-grid system using HOMER Pro®: A case study in Colombia,” Energies, vol. 13, no. 7, p. 1662, 2020PublicationORIGINALDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdfDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdfapplication/pdf29656https://repositorio.cuc.edu.co/bitstreams/51877967-cd65-42c0-8f8d-a0266c3c0ecb/download6dff7a862ab302b03db5e1d22cd7960dMD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8805https://repositorio.cuc.edu.co/bitstreams/475e914b-27aa-4928-88ff-249733c451e4/download4460e5956bc1d1639be9ae6146a50347MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-83196https://repositorio.cuc.edu.co/bitstreams/30c99bf4-d9db-4cde-8e98-bb59a3110512/downloade30e9215131d99561d40d6b0abbe9badMD53THUMBNAILDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdf.jpgDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdf.jpgimage/jpeg41465https://repositorio.cuc.edu.co/bitstreams/eab33387-4b1c-4d6a-99bb-397de09c4210/downloadf5fe3fd0aeed806aed7033d7fe4e38c3MD54TEXTDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdf.txtDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdf.txttext/plain1116https://repositorio.cuc.edu.co/bitstreams/e886176e-957d-4800-abdd-64c258da74b9/download750d6ebeb4e539ef854eea53fa27ecc5MD5511323/7303oai:repositorio.cuc.edu.co:11323/73032024-09-17 10:59:05.358http://creativecommons.org/licenses/by-nc-nd/4.0/Attribution-NonCommercial-NoDerivatives 4.0 Internationalopen.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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 |