IT in Manufacturing


Visualising and analysing control system traffic

November 2015 IT in Manufacturing

Control system security has become a serious concern in recent years due to the proliferation of cyber attacks targeting critically important infrastructure like public utilities: electric power, gas and water. As control systems increasingly rely on operating systems and standard protocols that are both open and versatile, cyber attacks are very common now with various infection routes not only via the Internet but also via USB memory devices and other media, making it difficult to prevent all malware infections. Therefore, there is an urgent need for a technology that can quickly detect security incidents. Such technology should not have an impact on control system availability (stable, continuous operation) as these systems need to keep operating without interruption for very long periods, even as long as several decades.

A host in control room A has become infected with malware and there has been an increase in network traffic.
A host in control room A has become infected with malware and there has been an increase in network traffic.

Yokogawa’s achievement

The National Institute of Information and Communications Technology of Japan (NICT), Yokogawa, and Kyoto University jointly developed a technology for visualising and analysing control system traffic to verify its integrity and quickly detect security incidents such as malware infections.

Unlike general information systems where the amount and direction of traffic keep changing, it is easier with control system networks to identify when traffic conditions are normal as these systems are designed and used for a specific purpose. The development focused on this characteristic.

The technology saves data on normal control system traffic conditions as a white list. With reference to this list, it then monitors the dynamic state of the control system network to detect any abnormalities such as an increase in traffic or communication with an unknown IP address that could be caused by malware.

Furthermore, by using Nirvana, a real-time traffic visualisation system developed by NICT, the technology was improved to comply with unique communications protocols used by control systems. As a result, it can identify traffic conditions much easier when an abnormality is identified.

Since there is no need to install detection software on each control system host (or server), this technology is easy to introduce and does not impact control system availability.

This technology has been integrated in Yokogawa’s cyber security support service for control systems, and is expected to make the systems used in critically important infrastructure more secure.

For more information contact Christie Cronje, Yokogawa South Africa, +27 (0)11 831 6300, christie.cronje@za.yokogawa.com, www.yokogawa.com/za



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Platform for integrated digital mine management
IT in Manufacturing
Becker Mining launches platform for integrated digital mine management

Read more...
The reimagined building of today and tomorrow
Schneider Electric South Africa IT in Manufacturing
Retrofitting a building is a truly practical way of achieving energy efficiency, compliance and long-term competitiveness.

Read more...
The Konecranes portal, a benchmark in data supply
IT in Manufacturing
The newly launched Konecranes Portal takes online communications to the next level through its single point of access to its digital customer platforms.

Read more...
End-to-end security across IT and OT environments
IT in Manufacturing
Siemens is collaborating with Accenture to offer 24/7 managed IT/OT security operations centre services, providing end-to-end security across IT and OT environments.

Read more...
Mitigating cybersecurity threats
Rockwell Automation IT in Manufacturing
Wesco is a world leader in electrical, communications and utility distribution and supply chain services and a member of the Rockwell Automation PartnerNetwork programme. To build their cybersecurity portfolio, Wesco turned to two Rockwell Automation offerings, a security posture survey and threat detection services.

Read more...
MRO inventory optimisation
RS South Africa IT in Manufacturing
Maintenance, repair and operations inventory optimisation is not just a technical concern, it is a strategic priority for industries that depend on operational reliability and efficiency.

Read more...
Liquid cooling solutions for hyperscale data centre environments
Schneider Electric South Africa IT in Manufacturing
Schneider Electric has unveiled its world-leading portfolio of end-to-end liquid cooling solutions for hyperscale, colocation and high-density data centre environments, engineered to enable the AI factories of the future.

Read more...
Corrosion in data centre cooling systems
IT in Manufacturing
Taking proactive steps to fight corrosion is critical to maintaining healthy cooling towers alongside data centres.

Read more...
Smart assistant supports troubleshooting and analyser maintenance
Siemens South Africa IT in Manufacturing
The Siemens Industrial Copilot for process analyser technology is a smart, offline assistant that supports technicians in troubleshooting and maintaining analysers.

Read more...
AI and the smart factory
Schneider Electric South Africa IT in Manufacturing
Imagine walking into a factory where machines can think ahead, predict problems before they happen, and automatically make adjustments to realise peak performance. This isn’t science fiction; it’s happening right now as AI transforms how we run industrial operations.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved