Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
- Authors: Zegzhda D.P.1, Kalinin M.O.1, Levykin M.V.2
-
Affiliations:
- Peter the Great St.Petersburg Polytechnic University
- Federal Research Center “Computer Science and Control,” Russian Academy of Sciences
- Issue: Vol 53, No 8 (2019)
- Pages: 972-979
- Section: Article
- URL: https://journal-vniispk.ru/0146-4116/article/view/175983
- DOI: https://doi.org/10.3103/S0146411619080339
- ID: 175983
Cite item
Abstract
Open Platform Communications (OPC), the interoperability standard for the secure and reliable exchange of data in the industrial automation space, consists of two main types of protocol – classic and unified. The paper reviews a classic set of DA/HDA/A&E protocols, which is based on Microsoft DCOM and RPC technologies. Architectural cyber threats of the classic type of OPC are systematized in this work.
About the authors
D. P. Zegzhda
Peter the Great St.Petersburg Polytechnic University
Author for correspondence.
Email: dmitry@ibks.spbstu.ru
Russian Federation, St. Petersburg, 195251
M. O. Kalinin
Peter the Great St.Petersburg Polytechnic University
Author for correspondence.
Email: max@ibks.spbstu.ru
Russian Federation, St. Petersburg, 195251
M. V. Levykin
Federal Research Center “Computer Science and Control,” Russian Academy of Sciences
Email: max@ibks.spbstu.ru
Russian Federation, Moscow, 119333
Supplementary files
