Industrial Control Systems (ICS) are computerized systems used to monitor and control industrial production processes. With the rapid development of Industry 4.0 and smart manufacturing, industrial control systems have been widely used in various fields. However, with the development of technology, industrial control systems are also facing more and more cyber security threats. In this paper, we will introduce in detail the cyber security threats faced by industrial control systems and propose corresponding protective measures.
1. Malware Attack
Malware attacks are one of the most common cybersecurity threats facing industrial control systems. Malware can destroy the normal operation of the system, steal sensitive data, and even cause serious damage to the production process. Common malware attacks include:
1.1 Virus: Virus is a kind of self-replicating malware that can be spread through various ways, such as e-mail, U disk, and so on. Once infected, the virus will keep replicating in the system, consuming system resources and even destroying system files.
1.2 Worms: Worms are a type of self-propagating malware that can spread through a network without user intervention. Worm attacks can cause network congestion, affect system performance, and even lead to system crashes.
1.3 Trojan Horse: Trojan Horse is a type of malware that disguises itself as legitimate software, usually by tricking users into downloading or installing it. Once activated, Trojans steal sensitive data and even allow attackers to remotely control infected systems.
1.4 Ransomware: Ransomware is a type of malware that encrypts the victim's data and demands a ransom to unlock it. Ransomware attacks can lead to production disruptions and cause huge financial losses.
2.Phishing Attacks
Phishing attacks are a type of cyber-attacks that trick users into divulging sensitive information by disguising themselves as legitimate organizations or individuals. In industrial control systems, phishing attacks usually target key personnel such as engineers and operators to gain system access or sensitive data. Common phishing attack methods include:
2.1 Email Phishing: Attackers send forged emails to trick users into clicking on malicious links or downloading attachments to implant malware or steal sensitive information.
2.2 Website Phishing: Attackers create fake websites similar to the target organization and trick users into entering sensitive information such as usernames and passwords.
2.3 Phone Phishing: Attackers impersonate legitimate organizations or individuals over the phone to trick users into providing sensitive information or performing specific operations.
3.Denial of Service Attack
Denial of Service (DoS) attack is a kind of attack method that makes normal users unable to access the target system by consuming system resources or network bandwidth. In industrial control systems, denial of service attacks can lead to production interruptions and cause serious losses. Common means of denial of service attacks include:
3.1 Flooding attack: the attacker sends a large number of packets to consume the network bandwidth or processing capacity of the target system, resulting in the system not being able to respond normally to user requests.
3.2 Distributed Denial of Service Attack (DDoS): The attacker utilizes multiple infected computers or devices to launch a flood attack on the target system at the same time to increase the effect of the attack.
3.3 Denial of Service Attack: The attacker sends specific packets or requests to make the target system fall into an abnormal state and unable to provide normal services.
4.Insider Threats
Insider threats are security threats from people inside the organization. Insiders may attack or destroy the industrial control system due to dissatisfaction, revenge, and economic interests. Common insider threats include:
4.1 Malicious employees: employees may intentionally sabotage the system or leak sensitive information due to dissatisfaction, revenge, etc.
4.2 Negligence: Employees may be negligent, resulting in system security vulnerabilities being exploited or sensitive data being leaked.
4.3 Privilege Abuse: Employees with high privileges may abuse their privileges to access or modify unauthorized data.
5.Supply Chain Attack
A supply chain attack is a means by which an attacker penetrates a link in the supply chain and then attacks the target organization. In industrial control systems, supply chain attacks may implant malware or vulnerabilities into the system through devices, software, and services. Common supply chain attack means include:
5.1 Equipment implantation: attackers implant malicious hardware or software during the production or maintenance of equipment.
5.2 Software implantation: Attackers implant malicious code or backdoor in the process of software development or distribution.
5.3 Service implantation: The attacker obtains system access rights by providing malicious services, such as fake technical support and training.
6.Wireless Network Attack
With the wide application of wireless technology in industrial control systems, wireless network attacks have become an important security threat. Attackers may listen to, interfere with or attack industrial control systems through wireless networks. Common wireless network attack methods include:
6.1 Wireless listening: the attacker obtains sensitive information or system status by listening to wireless signals.
6.2 Wireless interference: the attacker sends interference signals to affect the normal communication of the wireless network.
6.3 Wireless invasion: the attacker obtains system access privileges by cracking the security of the wireless network.




