Model-Based Cybersecurity Analysis Extending Enterprise Modeling to Critical Infrastructure Cybersecurity

被引:7
|
作者
Jiang, Yuning [1 ,2 ]
Jeusfeld, Manfred A. [2 ]
Ding, Jianguo [3 ]
Sandahl, Elin [4 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Univ Skovde, S-54128 Skovde, Sweden
[3] Blekinge Inst Technol, S-37179 Karlskrona, Sweden
[4] Norgald AB, Langland 2B, S-41133 Gothenburg, Sweden
关键词
Critical infrastructure; Domain-specific language; Cybersecurity; Power grids; CYBER-PHYSICAL SYSTEMS; ARCHITECTURE MANAGEMENT; INFORMATION SECURITY; FAILURE ANALYSIS; INTEGRATION; FUTURE;
D O I
10.1007/s12599-023-00811-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructure (CIs) such as power grids link a plethora of physical components from many different vendors to the software systems that control them. These systems are constantly threatened by sophisticated cyber attacks. The need to improve the cybersecurity of such CIs, through holistic system modeling and vulnerability analysis, cannot be overstated. This is challenging since a CI incorporates complex data from multiple interconnected physical and computation systems. Meanwhile, exploiting vulnerabilities in different information technology (IT) and operational technology (OT) systems leads to various cascading effects due to interconnections between systems. The paper investigates the use of a comprehensive taxonomy to model such interconnections and the implied dependencies within complex CIs, bridging the knowledge gap between IT security and OT security. The complexity of CI dependence analysis is harnessed by partitioning complicated dependencies into cyber and cyber-physical functional dependencies. These defined functional dependencies further support cascade modeling for vulnerability severity assessment and identification of critical components in a complex system. On top of the proposed taxonomy, the paper further suggests power-grid reference models that enhance the reproducibility and applicability of the proposed method. The methodology followed was design science research (DSR) to support the designing and validation of the proposed artifacts. More specifically, the structural, functional adequacy, compatibility, and coverage characteristics of the proposed artifacts are evaluated through a three-fold validation (two case studies and expert interviews). The first study uses two instantiated power-grid models extracted from existing architectures and frameworks like the IEC 62351 series. The second study involves a real-world municipal power grid.
引用
收藏
页码:643 / 676
页数:34
相关论文
共 50 条
  • [31] Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios
    Jauhar, Sumeet
    Chen, Binbin
    Temple, William G.
    Dong, Xinshu
    Kalbarczyk, Zbigniew
    Sanders, William H.
    Nicol, David M.
    2015 IEEE 21ST PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2015, : 319 - 324
  • [32] Functional cyber-resilience - Extending the cybersecurity paradigm in critical infrastructures
    de Haan, Johannes
    2023 IEEE/ACM 4TH INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS, ENCYCRIS, 2023, : 17 - 22
  • [33] Curriculum Development for Teaching Cybersecurity of Industrial Control Systems & Critical Infrastructure
    Hamdan, Basil
    Al Nsour, Rawan
    2022 INTERMOUNTAIN ENGINEERING, TECHNOLOGY AND COMPUTING (IETC), 2022,
  • [34] Technical Framework Research on Critical Information Infrastructure Cybersecurity Classified Protection
    Ren Weihong
    Yuan Jing
    Jiang Lei
    Zhao Tai
    Proceedings of the 2016 4th International Conference on Machinery, Materials and Information Technology Applications, 2016, 71 : 1177 - 1181
  • [35] Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure
    Kure, Halima Ibrahim
    Islam, Shareeful
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (11) : 1478 - 1502
  • [36] How the American Jobs Plan could improve critical infrastructure cybersecurity
    Fairfax, Robert
    Control Engineering, 2021, 68 (09)
  • [37] Special issue on cybersecurity in the critical infrastructure: Advances and future directions Foreword
    Choo, Kim-Kwang Raymond
    Abawajy, Jemal
    Islam, Rafiqul
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2019, 102 : 40 - 41
  • [38] A Design Science Approach to Constructing Critical Infrastructure and Communicating Cybersecurity Risks
    Muegge, Steven
    Craigen, Dan
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2015, : 6 - 16
  • [39] Transforming Cybersecurity into Critical Energy Infrastructure: A Study on the Effectiveness of Artificial Intelligence
    Govea, Jaime
    Gaibor-Naranjo, Walter
    Villegas-Ch, William
    SYSTEMS, 2024, 12 (05):
  • [40] CONSTRUCTION CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION: NEW HORIZONS FOR CONSTRUCTION 4.0
    de Soto, Borja Garcia
    Georgescu, Alexandru
    Mantha, Bharadwaj
    Turk, Ziga
    Maciel, Abel
    Semih, Muammer
    JOURNAL OF INFORMATION TECHNOLOGY IN CONSTRUCTION, 2022, 27 : 571 - +