Dissertations / Theses on the topic 'Industrial Control Systems (ICS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Industrial Control Systems (ICS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Es-Salhi, Khaoula. "Segmentation and segregation mechanisms and models to secure the integration of Industrial control Systems (ICS) with corporate system." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0143/document.
Full textSecuring ICS systems, and especially integrated ones, is becoming one of the most urgent issues that disquiets not only all industrial actors but also governments. Very important number of industrial entities and infrastructures are so critical that any non contained cyber attack on these entities can cause huge damage to business, to environment and more gravely to national security and people safety.This thesis studies the integration of ICS with Corporate systems from a security standpoint. Our goal is to study integrated ICS systems security vulnerabilities and suggest models and mechanisms to improve their security and protect them against ceyberattacks. After conducting a study on the vulnerabilities of integrated ICS systems (IICS) and the existing security solutions, we focused on the study of defence in depth technique and its applicability to integrated ICS systems. We defined a new generic segmentation method for IICS, SONICS, which simplifies the segmentation of IICS by focusing only on spects that are really significant for segmentation. We next developed an improved version of SONICS, RIICS (Risk based IICS Segmentation), a segmentation method for IICS systems that fills the SONICS gaps by focusing on risk on top of technical and industrial specifications. To complement the segmentation method, we studied segregation and access control solutions. We proposed a new DTE-based l (Domain Type Enforcement) flow control model for integrated ICS systems
Myers, David. "Detecting cyber attacks on industrial control systems using process mining." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/130799/1/David_Myers_Thesis.pdf.
Full textAbdulrazzaq, Mohammed, and Yuan Wei. "Industrial Control System (ICS) Network Asset Identification and Risk Management." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38198.
Full textElrod, Michael. "A Novel Approach to Determining Real-Time Risk Probabilities in Critical Infrastructure Industrial Control Systems." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1006.
Full textBenjuma, Nuria Mahmud. "An educational framework to support industrial control system security engineering." Thesis, De Montfort University, 2017. http://hdl.handle.net/2086/15494.
Full textWyman, Matthew Cody. "The SAP Link: A Controller Architecture for Secure Industrial Control Systems." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8815.
Full textAndersson, Dorothea. "Simulation of industrial control system field devices for cyber security." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.
Full textIndustriella informations- och styrsystem utgör en viktig delav vårt moderna samhälle, inte minst när det gäller kontroll och skydd avkritisk infrastruktur som elnät och vattenförsörjning. Det finns stora behov avatt säkerhetstesta dessa typer av system, vilket ofta är omöjligt iproduktionsmiljöer med realtidskrav som är erkänt känsliga för störningar, tilloch med från vanligt förekommande analysverktyg. Denna rapport presenterarhur vanliga komponenter i industriella informations- och styrsystem kansimuleras för att lura potentiella antagonister, och hur de kan användas ivirtualiserade styrsystem för cybersäkerhetsforskning. 8 olika komponentersimulerades med hjälp av Honeyd, och en generellt applicerbarsimuleringsmetodik utvecklades. Hur dessa simuleringar kan vidareutvecklasför att fungera som riktiga styrsystemskomponenter i virtualiserade miljöer harockså undersökts.
Kulhánek, Radek. "Návrh na zavedení průmyslového řešení ISMS ve výrobní společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241566.
Full textEriksson, Alma, and Oskar Lindh. "Modellering av en cyberattack på ett industriellt säkerhetssystem." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295620.
Full textStuxnet, Havex, BlackEnergy, Crashoverride och Triton/Trisis är alla exempel på cybersäkerhetsincidenter där industrisystem blivit angripna. Händelsen Triton/Trisis är ny i sitt slag, eftersom angriparen kom hela vägen in i det industriella säkerhetssystemet i ett olje- och gasraffinaderi. Ä ven om det slutliga målet för attacken fortfarande är okänt, hade angriparen möjlighet att sätta människor i fara. Detaljer av attacken är fortfarande okända och forskning samt rekonstruktion av attacken pågår. Syftet med denna studie är att skapa en attackgraf över incidenten. Genom att samla in och kombinera information från allmänt tillgängligt material och betygsätta alla källor genom dess tillförlitlighet resulterade studien i en attackgraf med två lager. Varje nod och vektor i grafen har givits en tillförlitlighet och noderna innehåller relaterade källor, verktyg och nätverkssegment. Studien visar att det är möjligt att konstruera en attackgraf av incidenten även om det saknas detaljer. Dessutom visar den att den specifika skadliga koden var skräddarsydd, men stegen som behövdes för att nå det industriella säkerhetssystemet var till stor del möjliga med hjälp av offentligt tillgängliga verktyg. Som ett resultat behöver hela den industriella industrin förbereda sig för en upptrappning av cybersäkerhetsincidenter.
Kandidatexjobb i elektroteknik 2020, KTH, Stockholm
Kabir-Querrec, Maëlle. "Cyber sécurité des systèmes industriels pour les smart-grids : détection d'intrusion dans les réseaux de communication IEC 61850." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT032/document.
Full textInformation and Communication Technologies have been pervading Industrial Automation and Control Systems (IACS) for a few decades now. Initially, IACS ran proprietary protocols on closed networks, thus ensuring some level of security through obscurity and isolation. Technologies and usages have evolved and today this intrinsic security does not exist any longer, though. This transition is in progress in the electricity domain, the power infrastructure turning into the "smart grid".The IEC 61850 standard is key to the smart grid development. It is aimed at making interoperability possible in ``Communication networks and systems for power utility automation''. It thus defines a common data object model and a stack of protocols answering different purposes.Although the cyber risk in IACS is now widely acknowledged, IEC 61850 does not address cyber security in any way whatsoever.This work tackles the question of cyber security through network intrusion detection in IEC 61850 networks, and more specifically in real-time GOOSE communications. The idea is to get the most out of the protocol specifications and system configuration while developing a tailored NIDS. This enables detection accuracy
Amoah, Raphael. "Formal security analysis of the DNP3-Secure Authentication Protocol." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93798/1/Raphael_Amoah_Thesis.pdf.
Full textCotter, S. M. "Industrial vision systems." Thesis, Cardiff University, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.352506.
Full textGoodhart, Sean Gary. "Self-tuning control of industrial systems." Thesis, Coventry University, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303380.
Full textZhao, Xiaosha, and Lingjian Gan. "Industrial Control Systems On Multi-‐core." Thesis, Mälardalens högskola, Inbyggda system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28257.
Full textAshry, Mahmoud Mohamed. "Control of multivariable aerospace and industrial systems." Thesis, University of Manchester, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.504785.
Full textArnold, Chad. "Combating Integrity Attacks in Industrial Control Systems." Wright State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=wright1406586509.
Full textOliveira, Jose Paulo Barroso de Moura. "Evolutionary design of process control systems." Thesis, University of Salford, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244935.
Full textAbbod, Maysam Fadhel. "Supervisory intelligent control for industrial and medical systems." Thesis, University of Sheffield, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.295758.
Full textMorris, Kerry John. "Power line communication systems for industrial control applications." Thesis, Open University, 2001. http://oro.open.ac.uk/58199/.
Full textCook, Allan. "Establishing cyber situational awareness in industrial control systems." Thesis, De Montfort University, 2018. http://hdl.handle.net/2086/17463.
Full textLeander, Björn. "Access Control for Secure Industry 4.0 Industrial Automation and Control Systems." Licentiate thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-50734.
Full textSharif, Z. A. B. M. "Modelling and control of industrial robots." Thesis, City University London, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.356002.
Full textPaulsson, Johan. "Wireless Control of Industrial Robot." Thesis, Uppsala universitet, Solcellsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-415059.
Full textMok, Pik-yin. "Evolutionary optimisation of production-control systems /." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2358936x.
Full textMuller, Steve. "Risk monitoring with intrusion detection for industrial control systems." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0082/document.
Full textCyber-attacks on critical infrastructure such as electricity, gas, and water distribution, or power plants, are more and more considered to be a relevant and realistic threat to the European society. Whereas mature solutions like anti-malwareapplications, intrusion detection systems (IDS) and even intrusion prevention or self-healing systems have been designed for classic computer systems, these techniques have only been partially adapted to the world of Industrial ControlSystems (ICS). As a consequence, organisations and nations fall back upon risk management to understand the risks that they are facing. Today's trend is to combine risk management with real-time monitoring to enable prompt reactions in case of attacks. This thesis aims at providing techniques that assist security managers in migrating from a static risk analysis to areal-time and dynamic risk monitoring platform. Risk monitoring encompasses three steps, each being addressed in detail in this thesis: the collection of risk-related information, the reporting of security events, and finally the inclusion of this real time information into a risk analysis. The first step consists in designing agents that detect incidents in the system. In this thesis, an intrusion detection system is developed to this end, which focuses on an advanced persistent threat (APT) that particularly targets critical infrastructures. The second step copes with the translation of the obtained technical information in more abstract notions of risk, which can then be used in the context of a risk analysis. In the final step, the information collected from the various sources is correlated so as to obtain the risk faced by the entire system. Since industrial environments are characterised by many interdependencies, a dependency model is elaborated which takes dependencies into account when the risk is estimated
Harshe, Omkar Anand. "Preemptive Detection of Cyber Attacks on Industrial Control Systems." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/54005.
Full textMaster of Science
Balasubramanian, Harish. "Incremental Design Migration Support in Industrial Control Systems Development." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/50990.
Full textMaster of Science
Bourget, Edwin. "Diagnosing accidental and malicious events in industrial control systems." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0179.
Full textThe convergence of information and industrial systems triggered a paradigm shift in the management of malicious and accidental events.Safety and security must now interact and it changes the perimeters and the issues of diagnosis. After defining this new perimeter, this thesis provides an analysis of existing models that provide necessary informations for diagnosis. It then proposes PROS²E, a new event model upon which safety and security diagnosis can be performed in industrial systems. It was specificaly designed to exploit experience already present in the fields of safety and security management. PROS²E is then improved to represent more complex incidents and provide more accurate information. Several examples illustrate the diagnosis capacities of the model
Bell, Michael Ray. "Fuzzy logic control of uncertain industrial processes." Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/18998.
Full textTai, Hoi-lun Allen. "Quantitative analysis in monitoring and improvement of industrial systems." Click to view the E-thesis via HKUTO, 2010. http://sunzi.lib.hku.hk/hkuto/record/B4394193X.
Full textPáscoa, Flávio Gil Albano. "Lightweight robust behavior industrial agent methodology." Master's thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/11232.
Full textAssembly systems today face significant pressure to provide highly adaptable and quickly deployable solutions in order to deal with unpredictable changes according to market trends. However, control of assembly processes are dominated by the use of Programmable Logical Controllers (PLC) which do not provide the necessary mechanisms to easily deal with these challenges. The concept of agent-based control has been introduced as a solution to deal these challenges and support new production paradigms based on the plug and produce concept. However, this solution has not yet been proven to be a real alternative to the traditional PLC approach in terms of performance. This work is investigating the use an approach that is able to benefit from the relative advantages of both PLC and agents solutions. A new hybrid architecture is presented which combines the functionalities of a PLC with those of industrial agents. The focus is on assessing the performance of this approach and help change the minds of an industry averse to changes.
GHAFFARI, MASOUD. "PERCEPTION-BASED CONTROL FOR INTELLIGENT SYSTEMS." University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1155739459.
Full textNyqvist, Jennifer. "Operational technology definition and differentiation : In the context of operational systems in Sweden." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18752.
Full textKnowles, Carl William. "Assurance techniques for assessing security control efficacy : an industrial control systems case study." Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/79962/.
Full textShenassa, M. Hassan. "Expert tuners for PI control." Thesis, University of Salford, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.327897.
Full textLüders, Frank. "Use of component-based software architectures in industrial control systems /." Västerås : Mälardalen University, 2003. http://www.mrtc.mdh.se/publications/0607.pdf.
Full textDanielsson, Fredrik K. J. "Off-line programming, verification and optimisation of industrial control systems." Thesis, De Montfort University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.269247.
Full textGunjal, Abhinav Shivram. "Trusted Software Updates for Secure Enclaves in Industrial Control Systems." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/79130.
Full textMaster of Science
Pourvatan, Ladan. "Test Process Assessment of Industrial Control Systems via Safety Standards." Thesis, Mälardalens högskola, Inbyggda system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-54702.
Full textBreedon, Philip James. "Multiple axis fuzzy logic control of an industrial robot." Thesis, Nottingham Trent University, 2001. http://irep.ntu.ac.uk/id/eprint/10298/.
Full textTai, Hoi-lun Allen, and 戴凱倫. "Quantitative analysis in monitoring and improvement of industrial systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B4394193X.
Full textMok, Pik-yin, and 莫碧賢. "Evolutionary optimisation of production-control systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B29751020.
Full textPlummer, Andrew Robert. "Digital control techniques for electro-hydraulic servosystems." Thesis, University of Bath, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.280263.
Full textBiro, Robert Fuelep. "Visual servoing using industrial components." Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/17985.
Full textKing, Roger Charles. "An integrated approach to the modelling, design and control of industrial systems." Thesis, Cardiff University, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.304858.
Full textEricsson, Niclas. "Improving Development of Communication Software in Industrial Control Systems using Simulation." Licentiate thesis, Mälardalens högskola, Inbyggda system, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-37212.
Full textInom industrin förväntar sig slutkunderna att produkterna har en livslängd på 10–20 år med hög tillförlitlighet och tillgänglighet. De flesta industriella styrsystem automatiserar säkerhetskritiska processer. Detta gör att aspekter som förutbestämt beteende med små fördröjningar och variationer är avgörande för att skydda person, miljö och egendom. Trender som den nya digitaliseringen, sakernas internet, molnet, 5G, maskininlärning och artificiell intelligens, bidrar till att antalet styrsystem som ansluts till Internet ökar. Ökningen beror mycket på att slutkunder börjar förvänta sig nya tjänster, samt tillgång till affärs- och diagnostikinformation även utanför arbetsplatserna. Att introducera nya kommunikationslösningar inom industrin är ofta en stor investering. Riskerna är oftast höga samtidigt som befintliga kommunikationsteknologier och protokoll behöver stödjas även i framtiden. Att få ut produkterna snabbt på marknaden med bibehållen kvalitet är av stor betydelse. Under forsknings- och utvecklingsarbete spenderas mycket tid på isolerade aktiviteter som till exempel simuleringar, uppdateringar av verktyg, insamling av krav, design, programmering, felsökning, dokumentation, testning och granskningar. Att snabbt byta mellan dessa aktiviteter är ofta inte helt enkelt, på grund av att olika metoder och verktyg inte automatiskt kan utbyta eller överföra information. Fokus i denna avhandling är att förbättra effektiviteten vid forskning och utveckling av kommunikationsmjukvara. Effektiviteten är viktig av flera skäl, till exempel att snabbt integrera nya och innovativa forskningsresultat, snabbare nå marknaden med produkter och förbättra produktkvalitet. Initialt studeras olika metoder för att utvärdera kommunikationsfunktionalitet. Metodernas användbarhet kartläggs i förhållande till aktiviteter under forsknings- och utvecklingsarbete, samt viktiga industriella utmaningar identifieras. Trots stora forskningsinsatser inom nätverkssimulatorer, emulatorer och virtualisering, så finns det fortfarande utmaningar kvar för ökad användbarhet och nytta inom industrin. Vidare föreslås en flexibel kommunikationsstackdesign som stöder olika typer av egenskaper och implementationer, från realtidsoperativsystem till enheter helt utan operativsystem, samt olika typer av kommunikationsprotokoll, från realtid till icke-realtid. Slutligen föreslås en reducerad uppsättning nyckelfunktioner till nätverkssimulatorer, vilka implementerats och använts i en fallstudie i ett forskningsprojekt. Dessa bidrag tillsammans medför en förenkling och ökad automatisering vilket gör att mängden manuellt arbete minskar under forsknings- och utvecklingsarbete.
Liu, Jessamyn. "Anomaly detection methods for detecting cyber attacks in industrial control systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/129055.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 119-123).
Industrial control systems (ICS) are pervasive in modern society and increasingly under threat of cyber attack. Due to the critical nature of these systems, which govern everything from power and wastewater plants to refineries and manufacturing, a successful ICS cyber attack can result in serious physical consequences. This thesis evaluates multiple anomaly detection methods to quickly and accurately detect ICS cyber attacks. Two fundamental challenges in developing ICS cyber attack detection methods are the lack of historical attack data and the ability of attackers to make their malicious activity appear normal. The goal of this thesis is to develop methods which generalize well to anomalies that are not included in the training data and to increase the sensitivity of detection methods without increasing the false alarm rate. The thesis presents and analyzes a baseline detection method, the multivariate Shewhart control chart, and four extensions to the Shewhart chart which use machine learning or optimization methods to improve detection performance. Two of these methods, stationary subspace analysis and maximized ratio divergence analysis, are based on dimensionality reduction techniques, and an additional model-based method is implemented using residuals from LASSO regression models. The thesis also develops an ensemble method which uses an optimization formulation to combine the output of multiple models in a way that minimizes detection delay. When evaluated on 380 samples from the Kasperskey Tennessee Eastman process dataset, a simulated chemical process that includes disruptions from cyber attacks, the ensemble method reduced detection delay on attack data by 12% (55 minutes) on average when compared to the baseline method and was 9% (42 minutes) faster on average than the method which performed best on training data.
by Jessamyn Liu.
S.M.
S.M. Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center
Rajković, Kostadin. "MEASURING THE COMPLEXITY OF NATURAL LANGUAGE REQUIREMENTS IN INDUSTRIAL CONTROL SYSTEMS." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-44703.
Full textHargrove, Walter Edward. "THE use of a feedback systems incorporated with a morphological matrix for product/system development." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/16249.
Full textNaidoo, Puramanathan. "The control of a multi-variable industrial process, by means of intelligent technology." Thesis, Port Elizabeth Technikon, 2001. http://hdl.handle.net/10948/48.
Full text