CYBERSECURITY OF AUTOMATED INFORMATION SYSTEMS OF ELECTRIC POWER COMPLEXES IN THE MINING AND PROCESSING INDUSTRY
DOI:
https://doi.org/10.34185/1991-7848.2026.01.23Keywords:
cybersecurity, mining and processing plant, automated information system, Defense-in-Depth, programmable logic controllers, electric power complex, IEC 62443Abstract
The implementation of digital manufacturing concepts and intelligent sensor networks in the mining and processing industry exponentially increases the risk of targeted cyberattacks on enterprises' electric power complexes, where interference with algorithms can cause technogenic disasters. To enhance the cyber resilience of automated information systems, a comprehensive architectural model based on the Defense-in-Depth concept has been developed. A multi-level infrastructure is proposed, featuring microsegmentation of industrial networks, Deep Packet Inspection for basic industrial protocols, hardening operating system configurations on engineering workstations, and the use of microkernel platforms for network gateways. It is demonstrated that combining international security standards with predictive hardware monitoring of programmable logic controller supply currents reliably prevents software-based control-logic spoofing, effectively mitigates intrusion vectors, and guarantees the continuity of energy-efficient control in raw-material processing operations.
References
Nicholson A., Webber S., Dyer S., Patel T., Janicke H. SCADA security in the light of Cyber-Warfare. Computers & Security. 2012. Vol. 31, no. 4. P. 418–436. DOI: 10.1016/j.cose.2012.02.009
Tubis A.A., Werbińska-Wojciechowska S., Góralczyk M., Wróblewski A., Ziętek B. Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use. Sensors. 2020. Vol. 20, no. 24. P. 7210. DOI: 10.3390/s20247210
Alsabbagh W., Langendörfer P. A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers. Automation. 2022. Vol. 3, no. 4. P. 596–621. DOI: 10.3390/automation3040030
Piggin R. S. H. Development of industrial cyber security standards: IEC 62443 for SCADA and industrial control system security. IET Conference on Control and Automation 2013: Uniting Problems and Solutions, Birmingham, UK. 2013. DOI: 10.1049/cp.2013.0001
Slipachuk L., Toliupa S., Nakonechnyi V. The Process of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine. 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT), Lviv, Ukraine, 2–6 July 2019. DOI: 10.1109/aiact.2019.8847877
Mazepa S., Dostalek L., Sharmar O., Banakh S. Cybercrime and Vulnerability of Ukrainian Critical Information Infrastructure. 10th International Conference on Advanced Computer Information Technologies (ACIT), Deggendorf, Germany, 16–18 September 2020. DOI: 10.1109/acit49673.2020.9208965
Ilyenko A., Ilyenko S., Kulish T. Prospective protection methods of the Windows operating system. Cybersecurity: Education, Science, Technique. 2020. Vol. 4, no. 8. P. 124–134. DOI: 10.28925/2663-4023.2020.8.124134
Bichmou A., Chiocca J., Hernandez L., Hoffmann R.W., Horsham B., Lam H., McKinsey V., Bibyk S. Physical Cyber-Security of SCADA Systems. NAECON 2019 - IEEE National Aerospace and Electronics Conference, Dayton, OH, USA, 15–19 July 2019. DOI: 10.1109/naecon46414.2019.9057860
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Modern Problems of Metallurgy

This work is licensed under a Creative Commons Attribution 4.0 International License.









