CYBERSECURITY OF AUTOMATED INFORMATION SYSTEMS OF ELECTRIC POWER COMPLEXES IN THE MINING AND PROCESSING INDUSTRY

Authors

DOI:

https://doi.org/10.34185/1991-7848.2026.01.23

Keywords:

cybersecurity, mining and processing plant, automated information system, Defense-in-Depth, programmable logic controllers, electric power complex, IEC 62443

Abstract

The implementation of digital manufacturing concepts and intelligent sensor networks in the mining and processing industry exponentially increases the risk of targeted cyberattacks on enterprises' electric power complexes, where interference with algorithms can cause technogenic disasters. To enhance the cyber resilience of automated information systems, a comprehensive architectural model based on the Defense-in-Depth concept has been developed. A multi-level infrastructure is proposed, featuring microsegmentation of industrial networks, Deep Packet Inspection for basic industrial protocols, hardening operating system configurations on engineering workstations, and the use of microkernel platforms for network gateways. It is demonstrated that combining international security standards with predictive hardware monitoring of programmable logic controller supply currents reliably prevents software-based control-logic spoofing, effectively mitigates intrusion vectors, and guarantees the continuity of energy-efficient control in raw-material processing operations.

References

Nicholson A., Webber S., Dyer S., Patel T., Janicke H. SCADA security in the light of Cyber-Warfare. Computers & Security. 2012. Vol. 31, no. 4. P. 418–436. DOI: 10.1016/j.cose.2012.02.009

Tubis A.A., Werbińska-Wojciechowska S., Góralczyk M., Wróblewski A., Ziętek B. Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use. Sensors. 2020. Vol. 20, no. 24. P. 7210. DOI: 10.3390/s20247210

Alsabbagh W., Langendörfer P. A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers. Automation. 2022. Vol. 3, no. 4. P. 596–621. DOI: 10.3390/automation3040030

Piggin R. S. H. Development of industrial cyber security standards: IEC 62443 for SCADA and industrial control system security. IET Conference on Control and Automation 2013: Uniting Problems and Solutions, Birmingham, UK. 2013. DOI: 10.1049/cp.2013.0001

Slipachuk L., Toliupa S., Nakonechnyi V. The Process of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine. 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT), Lviv, Ukraine, 2–6 July 2019. DOI: 10.1109/aiact.2019.8847877

Mazepa S., Dostalek L., Sharmar O., Banakh S. Cybercrime and Vulnerability of Ukrainian Critical Information Infrastructure. 10th International Conference on Advanced Computer Information Technologies (ACIT), Deggendorf, Germany, 16–18 September 2020. DOI: 10.1109/acit49673.2020.9208965

Ilyenko A., Ilyenko S., Kulish T. Prospective protection methods of the Windows operating system. Cybersecurity: Education, Science, Technique. 2020. Vol. 4, no. 8. P. 124–134. DOI: 10.28925/2663-4023.2020.8.124134

Bichmou A., Chiocca J., Hernandez L., Hoffmann R.W., Horsham B., Lam H., McKinsey V., Bibyk S. Physical Cyber-Security of SCADA Systems. NAECON 2019 - IEEE National Aerospace and Electronics Conference, Dayton, OH, USA, 15–19 July 2019. DOI: 10.1109/naecon46414.2019.9057860

Downloads

Published

2026-04-30

How to Cite

[1]
2026. CYBERSECURITY OF AUTOMATED INFORMATION SYSTEMS OF ELECTRIC POWER COMPLEXES IN THE MINING AND PROCESSING INDUSTRY. Modern Problems of Metallurgy. 29 (Apr. 2026), 352–361. DOI:https://doi.org/10.34185/1991-7848.2026.01.23.