
5  CONCLUSIONS 
The detection system for signal sources with a given 
accuracy without the suspension of activities studied 
areas  of  wired  communication  networks,  as 
presented  in  this  paper,  will  reliably  protect  the 
automated control systems from illegal  intrusion  by 
third  parties.  It  will  improve  the  reliability  of  such 
systems in  terms  of  protection against unauthorised 
actions  by  a  third  party  and  internal  intruder  or 
malicious software and hardware. 
The  system  is  in  its  final  stage  of  development. 
Soon, the authors are planning to go for testing and 
further  improvement  of  the  existing  functionality. 
All tests of the hardware-software complex ‘Shield’ 
are  performed  in  the  enterprises  of  the  National 
Research  Nuclear  University  MEPhI  (Moscow 
Engineering Physics Institute). 
In the future the functionality of the system will 
be  expanded:  the  unit  housing  the  primary 
information  processing  of  the  localisation system is 
to be covered with a layer  of  radiation-resistant 
material as an additional option. This will reduce the 
influence of the exposure to ionising radiation on the 
results of monitoring. The layer of radiation-resistant 
material  applied  to  the  surface  of  the  housing  unit 
for primary data processing will ensure that the unit 
is  functional  in  high  background  radiation 
conditions. 
Also, the authors plan  to  develop four  solutions 
from existing design, which will focus on a specific 
type of facility and protected systems: 
  to  protect  the  automation  systems  of  ‘smart 
homes’  and  some  engineering  systems 
(heating,  air  conditioning,  multimedia  control, 
fire alarm); 
  to protect major smart facilities with automated 
control  systems  and  a  variety  of  engineering 
systems:  underground,  business  centers, 
stadiums, filling stations, etc.;  
  to  protect  industrial  sites  with  complex 
automated  control  systems  of  technological 
processes:  oil  and  gas,  railways,  electric  and 
nuclear facilities, etc. .;  
  hardware  and  software  security  scanners  that 
can be used to monitor major smart objects and 
industrial facilities. 
The  provided  in  a  paper  study  can  be  used  to 
improve  existing  ACS  security  means,  eliminating 
the  vulnerabilities  and  ensuring  more  detailed 
protection from attackers. 
Moreover,  this  study  can  be  taken  in  account 
during  creation  and  update  of  the  regulations 
governing  in  the  field  of  automated  systems` 
security. 
REFERENCES 
Stouffer, K.,  Falco, J.,  and Scarfone,  K.,  2013.  ‘Guide  to 
Industrial  Control  Systems  (ICS)  Security’.  NIST 
Special Publication 800-82.  Revision  1.  National 
Institute of Standards and Technology, May 2013. 
Ibrahimkadic,  S.,  Kreso,  S.,  2011.  ‘Characteristics  of 
modern industrial control systems’. Proceedings of the 
34th International Convention MIPRO.  Pages:  845-
849. 
Peng  Jie,  Liu  Li.,  2011.  ‘Industrial  Control  System 
Security’.  International Conference on Intelligent 
Human-Machine Systems and Cybernetics  (IHMSC), 
Vol. 2, 2011. Pages: 156-158. 
Cotroneo,  D.,  Pecchia,  A.,  Russo,  S.,  2013.  ‘Towards 
secure  monitoring  and  control  systems:  Diversify!’ 
43rd Annual IEEE/IFIP International Conference on 
Dependable Systems and Networks (DSN). Pages: 1-2. 
Mikhaylov, D.,  Zhukov,  I., Starikovskiy,  A., Zuykov,  A., 
Tolstaya, A., Fomin, M., 2013a.  ‘Method and System 
for  Protection  of  Automated  Control  Systems  for 
“Smart  Buildings”’.  International Journal of 
Computer Network and Information Security Vol.  5, 
No. 9, July 2013. Рages: 1-8. 
Zhukov,  I.,  Mikhailov,  D.,  and  Sheremet,  I.,  2014. 
Protection of automated systems against information 
technology exposure.  Moscow,  NRNU  MEPhI.  184 
pages: illustrated ISBN 978-5-7262-1980-6. 
Mikhaylov, D.,  Zhukov,  I., Starikovskiy,  A., Zuykov,  A., 
Tolstaya,  A.,  Fesenko,  S.,  Sivkov,  S.,  2013b. 
‘Hardware-software  complex  ensuing  information 
security of automated building management systems’. 
International Journal of Application or Innovation in 
Engineering & Management,  Vol.  2,  Issue  3,  March 
2013. Рages: 408-412. 
Mikhaylov,  D.,  Zhukov,  I.,  Sheremet  I.Protecting 
information  systems  from  information  and  technical 
influence. Moscow, NRNU MEPhI, 2014. 184 pages. 
Melin, A. M., Ferragut, E. M., Laska, J. A., Fugate, D. L., 
Kisner, R.,  2013. ‘A  mathematical framework for  the 
analysis  of  cyber-resilient  control  systems’.  6th 
International Symposium on Resilient Control Systems 
(ISRCS). Pages: 13-18. 
Mantere,  M.,  Sailio,  M.,  Noponen,  S.,  2012.  ‘Feature 
Selection  for  Machine  Learning  Based  Anomaly 
Detection  in  Industrial  Control  System  Networks’. 
IEEE International Conference on Green Computing 
and Communications (GreenCom). Pages: 771-774. 
Stoian,  I.,  Ignat,  S.,  Capatina,  D.,  Ghiran,  O.,  2014. 
‘Security  and  intrusion  detection  on  critical  SCADA 
systems  for  water  management’.  IEEE International 
Conference on Automation, Quality and Testing, 
Robotics. Pages: 1-6. 
Spyridopoulos, T., Maraslis, K., Tryfonas, T., Oikonomou, 
G.,  Shancang  Li.,  2014.  ‘Managing  cyber  security 
ICEIS2015-17thInternationalConferenceonEnterpriseInformationSystems
250