Demilitarized network to secure the data stored in industrial networks

Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all...

Full description

Autores:
Nuñez Alvarez, José R.
Zamora Pérez, Yelena
Benitez Pina, Israel Francisco
NORIEGA ANGARITA, ELIANA MARIA
Tipo de recurso:
http://purl.org/coar/resource_type/c_816b
Fecha de publicación:
2020
Institución:
Corporación Universidad de la Costa
Repositorio:
REDICUC - Repositorio CUC
Idioma:
eng
OAI Identifier:
oai:repositorio.cuc.edu.co:11323/7303
Acceso en línea:
https://hdl.handle.net/11323/7303
https://repositorio.cuc.edu.co/
Palabra clave:
Control system
Demilitarized network
Electrical network
Firewalls
Industrial network
Rights
closedAccess
License
Attribution-NonCommercial-NoDerivatives 4.0 International
id RCUC2_e1514158279e8e59dbd6d41ec643603b
oai_identifier_str oai:repositorio.cuc.edu.co:11323/7303
network_acronym_str RCUC2
network_name_str REDICUC - Repositorio CUC
repository_id_str
dc.title.spa.fl_str_mv Demilitarized network to secure the data stored in industrial networks
title Demilitarized network to secure the data stored in industrial networks
spellingShingle Demilitarized network to secure the data stored in industrial networks
Control system
Demilitarized network
Electrical network
Firewalls
Industrial network
title_short Demilitarized network to secure the data stored in industrial networks
title_full Demilitarized network to secure the data stored in industrial networks
title_fullStr Demilitarized network to secure the data stored in industrial networks
title_full_unstemmed Demilitarized network to secure the data stored in industrial networks
title_sort Demilitarized network to secure the data stored in industrial networks
dc.creator.fl_str_mv Nuñez Alvarez, José R.
Zamora Pérez, Yelena
Benitez Pina, Israel Francisco
NORIEGA ANGARITA, ELIANA MARIA
dc.contributor.author.spa.fl_str_mv Nuñez Alvarez, José R.
Zamora Pérez, Yelena
Benitez Pina, Israel Francisco
NORIEGA ANGARITA, ELIANA MARIA
dc.subject.spa.fl_str_mv Control system
Demilitarized network
Electrical network
Firewalls
Industrial network
topic Control system
Demilitarized network
Electrical network
Firewalls
Industrial network
description Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as the most appropriate for our application, since it allows efficient exchange of data guaranteeing security and avoiding the violation of the control system. Finally, the simulation of the proposed network is carried out.
publishDate 2020
dc.date.accessioned.none.fl_str_mv 2020-11-13T16:01:10Z
dc.date.available.none.fl_str_mv 2020-11-13T16:01:10Z
dc.date.issued.none.fl_str_mv 2020
dc.type.spa.fl_str_mv Pre-Publicación
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_816b
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/preprint
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ARTOTR
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/acceptedVersion
format http://purl.org/coar/resource_type/c_816b
status_str acceptedVersion
dc.identifier.issn.spa.fl_str_mv 20888708
dc.identifier.uri.spa.fl_str_mv https://hdl.handle.net/11323/7303
dc.identifier.instname.spa.fl_str_mv Corporación Universidad de la Costa
dc.identifier.reponame.spa.fl_str_mv REDICUC - Repositorio CUC
dc.identifier.repourl.spa.fl_str_mv https://repositorio.cuc.edu.co/
identifier_str_mv 20888708
Corporación Universidad de la Costa
REDICUC - Repositorio CUC
url https://hdl.handle.net/11323/7303
https://repositorio.cuc.edu.co/
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.references.spa.fl_str_mv [1] A. Loulijat, et al., “DFIG use with combined strategy in case of failure of wind farm,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2221-2234, 2019.
[2] S. Maity, et al., “Formal integrated network security analysis tool: Formal query-based network security configuration analysis,” IET Networks, vol. 4, no. 2, pp. 137-147, 2015.
[3] K. Dadheech, et al., “De-Militarized Zone: A Next Level to Network Security,” in Proceedings of the International Conference on Inventive Communication and Computational Technologies (ICICCT 2018), pp. 595-600, 2018.
[4] M. G. I. Cedeño, et al., “Sizing of a networked self-consumption system at the Technical University of Manabí, Ecuador,” in CISCI 2019 Decima Octava Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Decimo Sexto Simposium Iberoamericano en Edu., Cibernetica e Informatica-Memorias, vol. 1, pp. 6-11, 2019.
[5] Y. Li, et al., “Complex networks in advanced manufacturing systems,” Journal of Manufacturing Systems, vol. 43, no. 3, pp. 409-421, 2017.
[6] V. Varadharajan, et al., “A policy-based security architecture for software-defined networks,” IEEE Transaction on Information Forensics and Security, vol. 14, no. 4, pp. 897-912, 2019.
[7] I. Ahmad, et al., “Security in Software Defined Networks: A Survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2317-2346, 2015.
[8] Z. Chen, et al., “Collaborative network security in multi-tenant data center for cloud computing,” Tsinghua Science and Technology, vol. 19, no. 1, pp. 82-94, 2014.
[9] J. García, et al., “Reconfigurable distributed network control system for industrial plant automation,” IEEE Transaction on Industrial Electronics, vol. 51, no. 6, pp. 1168-1180, 2004.
[10] P. Tenti and T. Caldognetto, “Optimal control of Local Area Energy Networks (E-LAN),” Sustainable Energy, Grids and Networks, vol. 14, pp. 12-24, 2018.
[11] J. Neeli and N. K. Cauvery, “Trust-based secure routing against lethal behavior of nodes in wireless adhoc network,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1592-1598, 2020.
[12] J. R. Núñez A., et al., “Metodología de diagnóstico de fallos para sistemas fotovoltaicos de conexión a red,” Revista Iberoamericana de Automática e Informática Industrial, vol. 17, no. 1, p. 94, 2020.
[13] J. Aguilar, et al., “Sistemas MultiAgentes y sus Aplicaciones en Automatizací on Industrial,” Universidad de Los Andes, Merida, Venezuela, 2013.
[14] H. Hosseinian, et al., “Blockchain outlook for deployment of IoT in distribution networks and smart homes,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2787-2796, 2020.
[15] D. Vuksanović, et al., “Industry 4.0: the Future Concepts and New Visions of Factory of the Future Development,” International Scientific Conference on Ictand E-Business Related Research (SINTEZA 2016), pp. 293-298, 2016.
[16] C. G. Machado, et al., “Sustainable manufacturing in Industry 4.0: an emerging research agenda,” International Journal of Production Research, vol. 58, no. 5, pp. 1462-1484, 2020.
[17] J. Zhang, et al., “Improved minimum entropy control for two-input and two-output networked control systems,” in 2016 UKACC International Conference on Control, UKACC Control 2016, 2016.
[18] M. E. M. B. Gaid, et al., “Optimal integrated control and scheduling of networked control systems with communication constraints: Application to a car suspension system,” IEEE Transactions on Control Systems Technology, vol. 14, no. 4, pp. 776-787, 2006.
[19] B. Rahmani and A. H. D. Markazi, “Variable selective control method for networked control systems,” IEEE Transactions on Control Systems Technology, vol. 21, no. 3, pp. 975-982, 2013.
[20] J. Nuñez, et al., “Tools for the Implementation of a SCADA System in a Desalination Process,” IEEE Latin America Transactions, vol. 17, no. 11, pp. 1858-1864, 2019.
[21] S. McLaughlin, et al., “The Cybersecurity Landscape in Industrial Control Systems,” Proceedings of the IEEE, vol. 104, no. 5, pp. 1039-1057, 2016.
[22] P. T. Tin, et al., “Hybrid protocol for wireless EH network over weibull fading channel: Performance analysis,” International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp. 1085-1091, 2020.
[23] K. Liu, et al., “Survey on time-delay approach to networked control,” Annual Reviews in Control, vol. 48, pp. 57-79, 2019.
[24] S. Amin, et al., “Security of interdependent and identical networked control systems,” Automatica, vol. 49, no. 1, pp. 186-192, 2013.
[25] E. Henriksson, et al., “Multiple-Loop Self-Triggered Model Predictive Control for Network Scheduling and Control,” IEEE Transactions on Control Systems Technology, vol. 23, no. 6, pp. 2167-2181, 2015.
[26] J. Ponniah, et al., “A clean slate approach to secure wireless networking,” Foundations and Trends in Networking, vol. 9, no. 1, pp. 1-105, 2015.
[27] J. Zhu, et al., “Review and big data perspectives on robust data mining approaches for industrial process modeling with outliers and missing data,” Annual Reviews in Control, vol. 46, pp. 107-133, 2018.
[28] A. Mungekar, et al., “Augmentation of a SCADA based firewall against foreign hacking devices,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1359-1366, 2020.
[29] C. Shen, et al., “Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks,” IEEE Wireless Communications, vol. 25, no. 6, pp. 26-31, 2018.
[30] Y. S. Jeong and J. H. Park, “Artificial intelligence for the fourth industrial revolution,” Journal of Information Processing Systems, vol. 14, no. 6, pp. 1301-1306, 2018.
[31] F. A. Budes, et al., “Energy, economic, and environmental evaluation of a proposed solar-wind power on-grid system using HOMER Pro®: A case study in Colombia,” Energies, vol. 13, no. 7, p. 1662, 2020
dc.rights.spa.fl_str_mv Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/closedAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_14cb
rights_invalid_str_mv Attribution-NonCommercial-NoDerivatives 4.0 International
http://creativecommons.org/licenses/by-nc-nd/4.0/
http://purl.org/coar/access_right/c_14cb
eu_rights_str_mv closedAccess
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Corporación Universidad de la Costa
dc.source.spa.fl_str_mv International Journal of Electrical and Computer Engineering
institution Corporación Universidad de la Costa
dc.source.url.spa.fl_str_mv https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091185749&doi=10.11591%2fijece.v11i1.pp611-619&partnerID=40&md5=da7e96b150001ed80e1be1c6c44f5e2c
bitstream.url.fl_str_mv https://repositorio.cuc.edu.co/bitstreams/51877967-cd65-42c0-8f8d-a0266c3c0ecb/download
https://repositorio.cuc.edu.co/bitstreams/475e914b-27aa-4928-88ff-249733c451e4/download
https://repositorio.cuc.edu.co/bitstreams/30c99bf4-d9db-4cde-8e98-bb59a3110512/download
https://repositorio.cuc.edu.co/bitstreams/eab33387-4b1c-4d6a-99bb-397de09c4210/download
https://repositorio.cuc.edu.co/bitstreams/e886176e-957d-4800-abdd-64c258da74b9/download
bitstream.checksum.fl_str_mv 6dff7a862ab302b03db5e1d22cd7960d
4460e5956bc1d1639be9ae6146a50347
e30e9215131d99561d40d6b0abbe9bad
f5fe3fd0aeed806aed7033d7fe4e38c3
750d6ebeb4e539ef854eea53fa27ecc5
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio de la Universidad de la Costa CUC
repository.mail.fl_str_mv repdigital@cuc.edu.co
_version_ 1811760753127981056
spelling Nuñez Alvarez, José R.Zamora Pérez, YelenaBenitez Pina, Israel FranciscoNORIEGA ANGARITA, ELIANA MARIA2020-11-13T16:01:10Z2020-11-13T16:01:10Z202020888708https://hdl.handle.net/11323/7303Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as the most appropriate for our application, since it allows efficient exchange of data guaranteeing security and avoiding the violation of the control system. Finally, the simulation of the proposed network is carried out.Nuñez Alvarez, José R.Zamora Pérez, YelenaBenitez Pina, Israel Francisco-will be generated-orcid-0000-0003-2359-9768-600NORIEGA ANGARITA, ELIANA MARIA-will be generated-orcid-0000-0003-4580-2050-600application/pdfengCorporación Universidad de la CostaAttribution-NonCommercial-NoDerivatives 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/closedAccesshttp://purl.org/coar/access_right/c_14cbInternational Journal of Electrical and Computer Engineeringhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85091185749&doi=10.11591%2fijece.v11i1.pp611-619&partnerID=40&md5=da7e96b150001ed80e1be1c6c44f5e2cControl systemDemilitarized networkElectrical networkFirewallsIndustrial networkDemilitarized network to secure the data stored in industrial networksPre-Publicaciónhttp://purl.org/coar/resource_type/c_816bTextinfo:eu-repo/semantics/preprinthttp://purl.org/redcol/resource_type/ARTOTRinfo:eu-repo/semantics/acceptedVersion[1] A. Loulijat, et al., “DFIG use with combined strategy in case of failure of wind farm,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2221-2234, 2019.[2] S. Maity, et al., “Formal integrated network security analysis tool: Formal query-based network security configuration analysis,” IET Networks, vol. 4, no. 2, pp. 137-147, 2015.[3] K. Dadheech, et al., “De-Militarized Zone: A Next Level to Network Security,” in Proceedings of the International Conference on Inventive Communication and Computational Technologies (ICICCT 2018), pp. 595-600, 2018.[4] M. G. I. Cedeño, et al., “Sizing of a networked self-consumption system at the Technical University of Manabí, Ecuador,” in CISCI 2019 Decima Octava Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Decimo Sexto Simposium Iberoamericano en Edu., Cibernetica e Informatica-Memorias, vol. 1, pp. 6-11, 2019.[5] Y. Li, et al., “Complex networks in advanced manufacturing systems,” Journal of Manufacturing Systems, vol. 43, no. 3, pp. 409-421, 2017.[6] V. Varadharajan, et al., “A policy-based security architecture for software-defined networks,” IEEE Transaction on Information Forensics and Security, vol. 14, no. 4, pp. 897-912, 2019.[7] I. Ahmad, et al., “Security in Software Defined Networks: A Survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2317-2346, 2015.[8] Z. Chen, et al., “Collaborative network security in multi-tenant data center for cloud computing,” Tsinghua Science and Technology, vol. 19, no. 1, pp. 82-94, 2014.[9] J. García, et al., “Reconfigurable distributed network control system for industrial plant automation,” IEEE Transaction on Industrial Electronics, vol. 51, no. 6, pp. 1168-1180, 2004.[10] P. Tenti and T. Caldognetto, “Optimal control of Local Area Energy Networks (E-LAN),” Sustainable Energy, Grids and Networks, vol. 14, pp. 12-24, 2018.[11] J. Neeli and N. K. Cauvery, “Trust-based secure routing against lethal behavior of nodes in wireless adhoc network,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1592-1598, 2020.[12] J. R. Núñez A., et al., “Metodología de diagnóstico de fallos para sistemas fotovoltaicos de conexión a red,” Revista Iberoamericana de Automática e Informática Industrial, vol. 17, no. 1, p. 94, 2020.[13] J. Aguilar, et al., “Sistemas MultiAgentes y sus Aplicaciones en Automatizací on Industrial,” Universidad de Los Andes, Merida, Venezuela, 2013.[14] H. Hosseinian, et al., “Blockchain outlook for deployment of IoT in distribution networks and smart homes,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2787-2796, 2020.[15] D. Vuksanović, et al., “Industry 4.0: the Future Concepts and New Visions of Factory of the Future Development,” International Scientific Conference on Ictand E-Business Related Research (SINTEZA 2016), pp. 293-298, 2016.[16] C. G. Machado, et al., “Sustainable manufacturing in Industry 4.0: an emerging research agenda,” International Journal of Production Research, vol. 58, no. 5, pp. 1462-1484, 2020.[17] J. Zhang, et al., “Improved minimum entropy control for two-input and two-output networked control systems,” in 2016 UKACC International Conference on Control, UKACC Control 2016, 2016.[18] M. E. M. B. Gaid, et al., “Optimal integrated control and scheduling of networked control systems with communication constraints: Application to a car suspension system,” IEEE Transactions on Control Systems Technology, vol. 14, no. 4, pp. 776-787, 2006.[19] B. Rahmani and A. H. D. Markazi, “Variable selective control method for networked control systems,” IEEE Transactions on Control Systems Technology, vol. 21, no. 3, pp. 975-982, 2013.[20] J. Nuñez, et al., “Tools for the Implementation of a SCADA System in a Desalination Process,” IEEE Latin America Transactions, vol. 17, no. 11, pp. 1858-1864, 2019.[21] S. McLaughlin, et al., “The Cybersecurity Landscape in Industrial Control Systems,” Proceedings of the IEEE, vol. 104, no. 5, pp. 1039-1057, 2016.[22] P. T. Tin, et al., “Hybrid protocol for wireless EH network over weibull fading channel: Performance analysis,” International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp. 1085-1091, 2020.[23] K. Liu, et al., “Survey on time-delay approach to networked control,” Annual Reviews in Control, vol. 48, pp. 57-79, 2019.[24] S. Amin, et al., “Security of interdependent and identical networked control systems,” Automatica, vol. 49, no. 1, pp. 186-192, 2013.[25] E. Henriksson, et al., “Multiple-Loop Self-Triggered Model Predictive Control for Network Scheduling and Control,” IEEE Transactions on Control Systems Technology, vol. 23, no. 6, pp. 2167-2181, 2015.[26] J. Ponniah, et al., “A clean slate approach to secure wireless networking,” Foundations and Trends in Networking, vol. 9, no. 1, pp. 1-105, 2015.[27] J. Zhu, et al., “Review and big data perspectives on robust data mining approaches for industrial process modeling with outliers and missing data,” Annual Reviews in Control, vol. 46, pp. 107-133, 2018.[28] A. Mungekar, et al., “Augmentation of a SCADA based firewall against foreign hacking devices,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1359-1366, 2020.[29] C. Shen, et al., “Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks,” IEEE Wireless Communications, vol. 25, no. 6, pp. 26-31, 2018.[30] Y. S. Jeong and J. H. Park, “Artificial intelligence for the fourth industrial revolution,” Journal of Information Processing Systems, vol. 14, no. 6, pp. 1301-1306, 2018.[31] F. A. Budes, et al., “Energy, economic, and environmental evaluation of a proposed solar-wind power on-grid system using HOMER Pro®: A case study in Colombia,” Energies, vol. 13, no. 7, p. 1662, 2020PublicationORIGINALDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdfDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdfapplication/pdf29656https://repositorio.cuc.edu.co/bitstreams/51877967-cd65-42c0-8f8d-a0266c3c0ecb/download6dff7a862ab302b03db5e1d22cd7960dMD51CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8805https://repositorio.cuc.edu.co/bitstreams/475e914b-27aa-4928-88ff-249733c451e4/download4460e5956bc1d1639be9ae6146a50347MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-83196https://repositorio.cuc.edu.co/bitstreams/30c99bf4-d9db-4cde-8e98-bb59a3110512/downloade30e9215131d99561d40d6b0abbe9badMD53THUMBNAILDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdf.jpgDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdf.jpgimage/jpeg41465https://repositorio.cuc.edu.co/bitstreams/eab33387-4b1c-4d6a-99bb-397de09c4210/downloadf5fe3fd0aeed806aed7033d7fe4e38c3MD54TEXTDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdf.txtDEMILITARIZED NETWORK TO SECURE THE DATA STORED IN INDUSTRIAL NETWORKS.pdf.txttext/plain1116https://repositorio.cuc.edu.co/bitstreams/e886176e-957d-4800-abdd-64c258da74b9/download750d6ebeb4e539ef854eea53fa27ecc5MD5511323/7303oai:repositorio.cuc.edu.co:11323/73032024-09-17 10:59:05.358http://creativecommons.org/licenses/by-nc-nd/4.0/Attribution-NonCommercial-NoDerivatives 4.0 Internationalopen.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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