Cyber-Security-Aware Network Design of Industrial Control Systems

被引:32
|
作者
Genge, Bela [1 ]
Haller, Piroska [1 ]
Kiss, Istvan [1 ]
机构
[1] Petru Maior Univ Targu Mures, Informat Dept, Targu Mures 540088, Romania
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 03期
关键词
Industrial control systems (ICS); ISA-62443; network design; security conduit; security zone; GENETIC ALGORITHM; VIRTUAL NETWORK; OPTIMIZATION; ALLOCATION; TIME;
D O I
10.1109/JSYST.2015.2462715
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The pervasive adoption of traditional information and communication technologies hardware and software in industrial control systems (ICS) has given birth to a unique technological ecosystem encapsulating a variety of objects ranging from sensors and actuators to video surveillance cameras and generic PCs. Despite their invaluable advantages, these advanced ICS create new design challenges, which expose them to significant cyber threats. To address these challenges, an innovative ICS network design technique is proposed in this paper to harmonize the traditional ICS design requirements pertaining to strong architectural determinism and real-time data transfer with security recommendations outlined in the ISA-62443.03.02 standard. The proposed technique accommodates security requirements by partitioning the network into security zones and by provisioning critical communication channels, known as security conduits, between two or more security zones. The ICS network design is formulated as an integer linear programming (ILP) problem that minimizes the cost of the installation. Real-time data transfer limitations and security requirements are included as constraints imposing the selection of specific traffic paths, the selection of routing nodes, and the provisioning of security zones and conduits. The security requirements of cyber assets denoted by traffic and communication endpoints are determined by a cyber attack impact assessment technique proposed in this paper. The sensitivity of the proposed techniques to different parameters is evaluated in a first scenario involving the IEEE 14-bus model and in a second scenario involving a large network topology based on generated data. Experimental results demonstrate the efficiency and scalability of the ILP model.
引用
收藏
页码:1373 / 1384
页数:12
相关论文
共 50 条
  • [41] Improving the cyber resilience of industrial control systems
    Chaves, Andrew
    Rice, Mason
    Dunlap, Stephen
    Pecarina, John
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 17 : 30 - 48
  • [42] A separate design principle for priority-aware packet collection in industrial cyber-physical systems
    Lin, Feilong
    Chen, Cailian
    Xu, Qimin
    Hua, Cunqing
    Guan, Xinping
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [43] A separate design principle for priority-aware packet collection in industrial cyber-physical systems
    Feilong Lin
    Cailian Chen
    Qimin Xu
    Cunqing Hua
    Xinping Guan
    [J]. EURASIP Journal on Wireless Communications and Networking, 2016
  • [44] Cyber Security of the Application Layer of Mission Critical Industrial Systems
    Kozik, Rafal
    Choras, Michal
    Renk, Rafal
    Holubowicz, Witold
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2016, 2016, 9842 : 342 - 351
  • [45] Industrial systems: Cyber-security's new battlefront
    Piggin, Richard
    [J]. Engineering and Technology, 2014, 9 (08): : 70 - 74
  • [46] Cyber Security Issues of Critical Components for Industrial Control System
    Yang, Wen
    Zhao, Qianchuan
    [J]. 2014 IEEE CHINESE GUIDANCE, NAVIGATION AND CONTROL CONFERENCE (CGNCC), 2014, : 2698 - 2703
  • [47] Context-Aware Security Solutions for Cyber-Physical Systems
    Wan, Kaiyu
    Alagar, Vangalur
    [J]. MOBILE NETWORKS & APPLICATIONS, 2014, 19 (02): : 212 - 226
  • [48] Context-Aware Security Solutions for Cyber-Physical Systems
    Kaiyu Wan
    Vangalur Alagar
    [J]. Mobile Networks and Applications, 2014, 19 : 212 - 226
  • [49] Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems
    Tsigkanos, Christos
    Pasquale, Liliana
    Ghezzi, Carlo
    Nuseibeh, Bashar
    [J]. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, 2015, : 729 - 732
  • [50] Security-Aware Functional Modeling of Cyber-Physical Systems
    Wan, Jiang
    Canedo, Arquimedes
    Al Faruque, Mohammad Abdullah
    [J]. PROCEEDINGS OF 2015 IEEE 20TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2015,