Model-Based Cybersecurity Analysis Extending Enterprise Modeling to Critical Infrastructure Cybersecurity

被引:7
|
作者
Jiang, Yuning [1 ,2 ]
Jeusfeld, Manfred A. [2 ]
Ding, Jianguo [3 ]
Sandahl, Elin [4 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Univ Skovde, S-54128 Skovde, Sweden
[3] Blekinge Inst Technol, S-37179 Karlskrona, Sweden
[4] Norgald AB, Langland 2B, S-41133 Gothenburg, Sweden
关键词
Critical infrastructure; Domain-specific language; Cybersecurity; Power grids; CYBER-PHYSICAL SYSTEMS; ARCHITECTURE MANAGEMENT; INFORMATION SECURITY; FAILURE ANALYSIS; INTEGRATION; FUTURE;
D O I
10.1007/s12599-023-00811-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructure (CIs) such as power grids link a plethora of physical components from many different vendors to the software systems that control them. These systems are constantly threatened by sophisticated cyber attacks. The need to improve the cybersecurity of such CIs, through holistic system modeling and vulnerability analysis, cannot be overstated. This is challenging since a CI incorporates complex data from multiple interconnected physical and computation systems. Meanwhile, exploiting vulnerabilities in different information technology (IT) and operational technology (OT) systems leads to various cascading effects due to interconnections between systems. The paper investigates the use of a comprehensive taxonomy to model such interconnections and the implied dependencies within complex CIs, bridging the knowledge gap between IT security and OT security. The complexity of CI dependence analysis is harnessed by partitioning complicated dependencies into cyber and cyber-physical functional dependencies. These defined functional dependencies further support cascade modeling for vulnerability severity assessment and identification of critical components in a complex system. On top of the proposed taxonomy, the paper further suggests power-grid reference models that enhance the reproducibility and applicability of the proposed method. The methodology followed was design science research (DSR) to support the designing and validation of the proposed artifacts. More specifically, the structural, functional adequacy, compatibility, and coverage characteristics of the proposed artifacts are evaluated through a three-fold validation (two case studies and expert interviews). The first study uses two instantiated power-grid models extracted from existing architectures and frameworks like the IEC 62351 series. The second study involves a real-world municipal power grid.
引用
收藏
页码:643 / 676
页数:34
相关论文
共 50 条
  • [1] Model-Based Cybersecurity AnalysisExtending Enterprise Modeling to Critical Infrastructure Cybersecurity
    Yuning Jiang
    Manfred A. Jeusfeld
    Jianguo Ding
    Elin Sandahl
    Business & Information Systems Engineering, 2023, 65 : 643 - 676
  • [2] AN ENTERPRISE CYBERSECURITY STRATEGY FOR FEDERAL CRITICAL INFRASTRUCTURE MODERNIZATION
    Bradley, Ian D.
    Norville, Brian
    2018 INTEGRATED COMMUNICATIONS, NAVIGATION, SURVEILLANCE CONFERENCE (ICNS), 2018,
  • [3] AN ENTERPRISE CYBERSECURITY STRATEGY FOR FEDERAL CRITICAL INFRASTRUCTURE MODERNIZATION
    Bradley, Ian
    Norville, Brian
    2018 INTEGRATED COMMUNICATIONS, NAVIGATION, SURVEILLANCE CONFERENCE (ICNS), 2018,
  • [4] Model-based Cybersecurity for Control Systems: Modeling, Design and Control
    Sawada, Kenji
    2017 56TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2017, : 724 - 727
  • [5] Enterprise architecture modeling for cybersecurity analysis in critical infrastructures -A systematic literature review
    Jiang, Yuning
    Jeusfeld, Manfred A.
    Mosaad, Michael
    Oo, Nay
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 46
  • [6] Critical energy infrastructure and the evolution of cybersecurity
    Sanders, Peyton
    Bronk, Chris
    Bazilian, Morgan D.
    ELECTRICITY JOURNAL, 2022, 35 (10):
  • [7] Cybersecurity capabilities for critical infrastructure resilience
    Malatji, Masike
    Marnewick, Annlize L.
    Von Solms, Sune
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (02) : 255 - 279
  • [8] Model-based Cybersecurity Analysis: Past Work and Future Directions
    Enoch, Simon Yusuf
    Ge, Mengmeng
    Hong, Jin B.
    Kim, Dong Seong
    67TH ANNUAL RELIABILITY & MAINTAINABILITY SYMPOSIUM (RAMS 2021), 2021,
  • [9] On building cybersecurity expertise in critical infrastructure protection
    Mishra, Sumita
    Raj, Rajendra K.
    Romanowski, Carol J.
    Schneider, Jennifer
    Critelli, Anthony
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [10] A Review of Cybersecurity Risk and Consequences for Critical Infrastructure
    Touhiduzzaman, Md
    Gourisetti, Sri Nikhil Gupta
    Eppinger, Crystal
    Somani, Abhishek
    2019 RESILIENCE WEEK (RWS), 2019, : 7 - 13