Model-Based Cybersecurity Analysis Extending Enterprise Modeling to Critical Infrastructure Cybersecurity

被引:7
|
作者
Jiang, Yuning [1 ,2 ]
Jeusfeld, Manfred A. [2 ]
Ding, Jianguo [3 ]
Sandahl, Elin [4 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Univ Skovde, S-54128 Skovde, Sweden
[3] Blekinge Inst Technol, S-37179 Karlskrona, Sweden
[4] Norgald AB, Langland 2B, S-41133 Gothenburg, Sweden
关键词
Critical infrastructure; Domain-specific language; Cybersecurity; Power grids; CYBER-PHYSICAL SYSTEMS; ARCHITECTURE MANAGEMENT; INFORMATION SECURITY; FAILURE ANALYSIS; INTEGRATION; FUTURE;
D O I
10.1007/s12599-023-00811-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructure (CIs) such as power grids link a plethora of physical components from many different vendors to the software systems that control them. These systems are constantly threatened by sophisticated cyber attacks. The need to improve the cybersecurity of such CIs, through holistic system modeling and vulnerability analysis, cannot be overstated. This is challenging since a CI incorporates complex data from multiple interconnected physical and computation systems. Meanwhile, exploiting vulnerabilities in different information technology (IT) and operational technology (OT) systems leads to various cascading effects due to interconnections between systems. The paper investigates the use of a comprehensive taxonomy to model such interconnections and the implied dependencies within complex CIs, bridging the knowledge gap between IT security and OT security. The complexity of CI dependence analysis is harnessed by partitioning complicated dependencies into cyber and cyber-physical functional dependencies. These defined functional dependencies further support cascade modeling for vulnerability severity assessment and identification of critical components in a complex system. On top of the proposed taxonomy, the paper further suggests power-grid reference models that enhance the reproducibility and applicability of the proposed method. The methodology followed was design science research (DSR) to support the designing and validation of the proposed artifacts. More specifically, the structural, functional adequacy, compatibility, and coverage characteristics of the proposed artifacts are evaluated through a three-fold validation (two case studies and expert interviews). The first study uses two instantiated power-grid models extracted from existing architectures and frameworks like the IEC 62351 series. The second study involves a real-world municipal power grid.
引用
收藏
页码:643 / 676
页数:34
相关论文
共 50 条
  • [41] IoT Anomaly Detection to Strengthen Cybersecurity in the Critical Infrastructure of Smart Cities
    Villegas-Ch, William
    Govea, Jaime
    Jaramillo-Alcazar, Angel
    APPLIED SCIENCES-BASEL, 2023, 13 (19):
  • [42] Model-based Attack Tree Generation for Cybersecurity Risk-Assessments in Automotive
    Kern, Matthias
    Liu, Bo
    Betancourt, Victor Pazmino
    Becker, Juergen
    7TH IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (IEEE ISSE 2021), 2021,
  • [43] Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations
    Alqudhaibi, Adel
    Albarrak, Majed
    Aloseel, Abdulmohsan
    Jagtap, Sandeep
    Salonitis, Konstantinos
    SENSORS, 2023, 23 (09)
  • [44] A Novel Model for Cybersecurity Economics and Analysis
    Rathod, Paresh
    Hamalainen, Timo
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2017, : 274 - 279
  • [45] Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework
    Razikin, Khairur
    Soewito, Benfano
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (03) : 383 - 404
  • [46] Model Based Evaluation of Cybersecurity Implementations
    Dasso, Aristides
    Funes, Ana
    Montejano, German
    Riesco, Daniel
    Uzal, Roberto
    Debnath, Narayan
    INFORMATION TECHNOLOGY: NEW GENERATIONS, 2016, 448 : 303 - 313
  • [47] Building Critical Statewide Cybersecurity Capabilities: The Wisconsin Model
    Franco, Eric
    Yin, Roger
    Sankaranarayanan, Balaji
    PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE ON DIGITAL GOVERNMENT RESEARCH, DGO 2024, 2024, : 224 - 231
  • [48] Cybersecurity infrastructure challenges in IoT based virtual power plants
    Venkatachary, Sampath Kumar
    Prasad, Jagdish
    Samikannu, Ravi
    Alagappan, Annamalai
    Andrews, Leo John Baptist
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2020, 23 (02): : 263 - 276
  • [49] Cybersecurity in the Context of Criminal Law Protection of the State Security and Sectors of Critical Infrastructure
    Kelemen, Miroslav
    Szabo, Stanislav
    Vajdova, Iveta
    CHALLENGES TO NATIONAL DEFENCE IN CONTEMPORARY GEOPOLITICAL SITUATION (CNDCGS' 2018), 2018, : 100 - 104
  • [50] Cost and Cybersecurity Challenges in the Commissioning of Microgrids in Critical Infrastructure: COGE Case Study
    Kraemer, Rodrigo Antonio Sbardeloto
    Dias, Douglas Pereira
    da Silva, Alisson Carlos
    Martins, Marcos Aurelio Izumida
    Ludwig, Mathias Arno
    ENERGIES, 2022, 15 (08)