Cybersecurity Modelling for SCADA Systems: A Case Study

被引:0
|
作者
Cheng, Benny N. [1 ]
机构
[1] Naval Surface Warfare Ctr, Corona Div, 1999 4th St, Norco, CA 92860 USA
关键词
cybersecurity; MTTSF; SCADA systems; attack and countermeasure trees;
D O I
10.1109/RAMS51457.2022.9893946
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes a cybersecurity model for Supervisory Control and Data Acquisition system (SCADA) using techniques similar to those used in reliability systems modelling. Previously, cybersecurity events were considered a part of the reliability events of a cyber physical system [1] [2]. Our approach identifies and treats such events separately as unique class of events by itself. Our analyses shows that the hierarchical model described below has the potential for quantifying the cybersecurity posture of a SCADA system, which goes beyond the usual pass/fail metrics that are currently in use [3]. A range of Mean Time to Security Failure (MTTSF) values as shown in the sensitivity studies below can capture both peacetime and wartime cyber risk assessment of the system. While the Attack and Countermeasure Tree (ACT) constructed below could be taken as somewhat simplistic, more detailed security events can be readily introduced to the ACT tree to reflect a better depiction of a cyberattack. For example, the Common Processing Systems (CPS) systems themselves can be further resolved into constituent components that are vulnerable to cyberattacks. Separate models can also be developed for each of the individual failure events, i.e. confidentiality, integrity, and availability, instead of combining them into one failure event as done below. The methodology for computing the MTTSF metric can be extended to other similar cybersecurity metrics, such as those formulated by the Center for Internet Security (CIS) [3], e.g. mean time to restore to operational status, etc. Additional improvements to the model can be obtained with the incorporation of the repair and restore portion of the semi-Markov chain in Figure 3, which will likely require the use of more advance modeling packages.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Vulnerability Assessment of Cybersecurity for SCADA Systems
    Ten, Chee-Wooi
    Liu, Chen-Ching
    Manimaran, Govindarasu
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (04) : 1836 - 1846
  • [2] Cybersecurity of SCADA Systems: Vulnerability Assessment and Mitigation
    Liu, Chen-Ching
    Ten, Chee-Wooi
    Govindarasu, Manimaran
    2009 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION, VOLS 1-3, 2009, : 808 - +
  • [3] IIoT Cybersecurity Risk Modeling for SCADA Systems
    Falco, Gregory
    Caldera, Carlos
    Shrobe, Howard
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 4486 - 4495
  • [4] CYBERSECURITY VULNERABILITIES AND THREATS OF SCADA SYSTEMS IN CRITICAL INFRASTRUCTURES
    Savin, Vlad Daniel
    Serban, Costel
    PROCEEDINGS OF THE 13TH INTERNATIONAL MANAGEMENT CONFERENCE: MANAGEMENT STRATEGIES FOR HIGH PERFORMANCE (IMC 2019), 2019, : 234 - 237
  • [5] Vulnerability assessment of cybersecurity for SCADA systems using attack trees
    Ten, Chee-Wooi
    Liu, Chen-Ching
    Govindarasu, Manimaran
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 2527 - +
  • [6] A Systems Integration Case Study involving SCADA, Interfaces and Challenges
    Saxena, Kshitij P. E.
    2022 IEEE VEHICLE POWER AND PROPULSION CONFERENCE (VPPC), 2022,
  • [7] Modelling and Verification of Safety of Access Control in SCADA Systems
    Vistbakka, Inna
    Troubitsyna, Elena
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2020), 2021, 12528 : 354 - 364
  • [8] Industrial cybersecurity for power system and scada networks
    Creery, A
    Byres, EJ
    Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference, 2005, : 303 - 309
  • [9] An Evaluation of Cybersecurity Assessment Tools on a SCADA Environment
    Hahn, Adam
    Govindarasu, Manimaran
    2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2011,
  • [10] Survivable SCADA Systems: An analytical framework using performance modelling
    Queiroz, Carlos
    Mahmood, Abdun
    Tari, Zahir
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,