Cybersecurity Modelling for SCADA Systems: A Case Study

被引:0
|
作者
Cheng, Benny N. [1 ]
机构
[1] Naval Surface Warfare Ctr, Corona Div, 1999 4th St, Norco, CA 92860 USA
关键词
cybersecurity; MTTSF; SCADA systems; attack and countermeasure trees;
D O I
10.1109/RAMS51457.2022.9893946
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes a cybersecurity model for Supervisory Control and Data Acquisition system (SCADA) using techniques similar to those used in reliability systems modelling. Previously, cybersecurity events were considered a part of the reliability events of a cyber physical system [1] [2]. Our approach identifies and treats such events separately as unique class of events by itself. Our analyses shows that the hierarchical model described below has the potential for quantifying the cybersecurity posture of a SCADA system, which goes beyond the usual pass/fail metrics that are currently in use [3]. A range of Mean Time to Security Failure (MTTSF) values as shown in the sensitivity studies below can capture both peacetime and wartime cyber risk assessment of the system. While the Attack and Countermeasure Tree (ACT) constructed below could be taken as somewhat simplistic, more detailed security events can be readily introduced to the ACT tree to reflect a better depiction of a cyberattack. For example, the Common Processing Systems (CPS) systems themselves can be further resolved into constituent components that are vulnerable to cyberattacks. Separate models can also be developed for each of the individual failure events, i.e. confidentiality, integrity, and availability, instead of combining them into one failure event as done below. The methodology for computing the MTTSF metric can be extended to other similar cybersecurity metrics, such as those formulated by the Center for Internet Security (CIS) [3], e.g. mean time to restore to operational status, etc. Additional improvements to the model can be obtained with the incorporation of the repair and restore portion of the semi-Markov chain in Figure 3, which will likely require the use of more advance modeling packages.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Emerging Cyber Risks & Threats in Healthcare Systems: A Case Study in Resilient Cybersecurity Solutions
    Abdi, Abdiaziz
    Bennouri, Hajar
    Keane, Anthony
    2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024, 2024, : 432 - 439
  • [22] Deep Learning of Sensor Data in Cybersecurity of Robotic Systems: Overview and Case Study Results
    Szynkiewicz, Wojciech
    Niewiadomska-Szynkiewicz, Ewa
    Lis, Kamila
    ELECTRONICS, 2023, 12 (19)
  • [23] Design and Development of Wireless RTU and Cybersecurity Framework for SCADA System
    Durrani, Shakeel
    Jattala, Imran
    Farooqi, Junaid
    Shakeel, Naila
    Murad, Mohsin
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [24] Modelling Multi-Stakeholder Systems: A Case Study
    Oey, Michel
    Genc, Zulkuf
    Ghorbani, Amineh
    Aldewereld, Huib
    Brazier, Frances
    Aydogan, Reyhan
    Jonker, Catholijn M.
    Timmer, Reinier
    Wijngaards, Niek
    2014 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 3, 2014, : 404 - 411
  • [25] A Case Study on Modelling the Communication Structure of Critical Systems
    Guimaraes, Marcos Salenko
    Baranauskas, M. Cecilia C.
    INFORMATION SYSTEMS IN THE CHANGING ERA: THEORY AND PRACTICE, 2009, : 465 - 472
  • [26] A case study for modelling and design of distributed automation systems
    Ferrarini, L
    Veber, C
    Lorentz, K
    PROCEEDINGS OF THE 2003 IEEE/ASME INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT MECHATRONICS (AIM 2003), VOLS 1 AND 2, 2003, : 1043 - 1048
  • [27] Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training
    Puys, Maxime
    Thevenon, Pierre-Henri
    Mocanu, Stephane
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [28] Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
    Zhang, Taimin
    Wang, Yinan
    Liang, Xiao
    Zhuang, Zhou
    Xu, Wenyuan
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 6847 - 6852
  • [29] Scada systems
    Vector Electr Eng, (06):
  • [30] Artificial Intelligence in Cybersecurity: A Review and a Case Study
    Okdem, Selcuk
    Okdem, Sema
    Applied Sciences (Switzerland), 2024, 14 (22):