Open Access Open Access  Restricted Access Subscription or Fee Access

Double Layer Gateway Model for Connection Between Production Network and Enterprise Network


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/ireaco.v8i1.4897

Abstract


Integration of enterprise informational systems such as ERP to production networks becomes deeper. Double-layer gateway model presented in this paper could reduce potential risks of enterprise systems integration. The scope of this paper is creating generic model which should be safer than standard models. Model of safety solution for gateway is suggested.  Several models including presented by CISCO were analyzed. Models were assessed as time homogeneous discrete state Markov process solved by Kolmogorov equation. Enterprise network security, human factor, vulnerabilities in PLCs and network equipment were taken into account. Dangerous of disregarding safety efforts during production network integration is shown. Model presented in this paper was developed for pharmacy industry but it can be used in other production sectors with high mistake risk as well. Solution presented in this paper is more than 200 times secure than very common solution without safety efforts and 19 times safer than solution presented by major company.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


PLC Security; Production Network Security; ERP Integration; Data Collection Systems; IDMZ; Double-Layer Gateway; Pharmaceutical Industry

Full Text:

PDF


References


Manufacturing & Logistics IT. ERP spreads its wings - ERP report. www.logisticsit.com, March 2013.

Pramod, D., Bharathi, S.V., Raman, R., A fuzzy petri-net model for predicting the post-implementation risks of ERP in small and medium enterprises, (2014) International Review on Computers and Software (IRECOS), 9 (11), pp. 1852-1860.
http://dx.doi.org/10.15866/irecos.v9i11.4478

Zaitar, Y., Risk assessment in ERP projects life cycle: The application of FMEA approach, (2014) International Review on Computers and Software (IRECOS), 9 (11), pp. 1888-1895.
http://dx.doi.org/10.15866/irecos.v9i11.4466

ASINCOM, GOST R 52249-2009 GMP Guide to Good Manufacturing Practice for Medicinal Products for Human and Veterenary Use, GOST R 52249-2009 GMP Guide to Good Manufacturing Practice for Medicinal Products for Human and Veterenary Use (Moscow, 2009)

Ministry of trading and industry, Russian Federation Ministry of trading and industry order, (Moscow 2009)

ISPE, GAMP® 5: A Risk-Based Approach to Compliant GxP Computerized Systems, February 2008

Williams, Theodore J. The Purdue enterprise reference architecture. ("Computers in industry, 1994 pp. 141-158).
http://dx.doi.org/10.1016/0166-3615(94)90017-5

Viszus, E., Blaho, M., Vodička, V., Murgaš, J., Real-time motor control based on PROFINET protocol, (2014) International Review of Automatic Control (IREACO), 7 (3), pp. 328-333.

A.P.Kozletsov I.S.R. Modern methods of data exchange in control systems, ITPP. 2010

Mahnke, Wolfgang, Stefan-Helmut Leitner, and Matthias Damm. OPC unified architecture. (Springer, 2009).
http://dx.doi.org/10.1007/978-3-540-68899-0

Symantec Corporation, W32 Stuxnet dossier, Cupertino, CA, 2011

ICS-Cert, Rockwell Allen-Bradley MicroLogix, SLC 500, and PLC-5 Fault Generation Vulnerability (Update B), 2014

Walder B, Siemens PLC Vulnerabilities, Austin, TX

Cisco Systems and Rockwell Automation. Ethernet-to-the-Factory 1.2 Design and Implementation Guide. (San Jose, Milwaukee. 2008)

CISCO Security Advisory, Multiple Vulnerabilities in Cisco Firewall Services Module Software, 2013

Positive Technologies, Vulnerability statistics for enterprise informational systems (2013 year), (Moscow, 2014)

Positive Technologies, Vulnerability statistics for enterprise informational systems 2011-2012 years, (Moscow, 2013).

G.P. Akimov, A.V. Soloviev, E.V. Pashkina, Methodological approach to determine the effect of human factor on performance information Systems, Proceedings of ISA RAS, 2007. Volume 29 pp 102-112

I.E. Tsibulevsky, Erroneous reaction of the human operator in the control system (Review of Foreign Studies). Automation and Remote Control, Volume 6, pp 112-144

B. Gertman, Human Error and Available Time SPAR-H, Workshop on Temporal Aspects of Work for HC1, 2004

Cross, Exploiting Lawful Intercept to Wiretap the Internet, 2014

Siemens AG, Security vulnerabilities in Siemens SIMATIC S7-1200 CPU, 2011

A.A. Ponomarev, Solution of time estimation to overcome security systems, Actual problems of security of information technologies Krasnoyarsk, 2008

B. Walder, Siemens PLC Vulnerabilities, NCC Labs, Inc, Austin, TX

J. Reason, Human error: models and management, BMJ, № 320, pp. 768-770, March 2000
http://dx.doi.org/10.1136/bmj.320.7237.768

Yadigar N. Imamverdiyev , GM (1, 1)-Markov model for software vulnerabilities prediction Problems of Information Technologies, №1, pp. 27-37, 2014


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize