Cybersecurity Modelling for SCADA Systems: A Case Study

被引:0
|
作者
Cheng, Benny N. [1 ]
机构
[1] Naval Surface Warfare Ctr, Corona Div, 1999 4th St, Norco, CA 92860 USA
关键词
cybersecurity; MTTSF; SCADA systems; attack and countermeasure trees;
D O I
10.1109/RAMS51457.2022.9893946
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes a cybersecurity model for Supervisory Control and Data Acquisition system (SCADA) using techniques similar to those used in reliability systems modelling. Previously, cybersecurity events were considered a part of the reliability events of a cyber physical system [1] [2]. Our approach identifies and treats such events separately as unique class of events by itself. Our analyses shows that the hierarchical model described below has the potential for quantifying the cybersecurity posture of a SCADA system, which goes beyond the usual pass/fail metrics that are currently in use [3]. A range of Mean Time to Security Failure (MTTSF) values as shown in the sensitivity studies below can capture both peacetime and wartime cyber risk assessment of the system. While the Attack and Countermeasure Tree (ACT) constructed below could be taken as somewhat simplistic, more detailed security events can be readily introduced to the ACT tree to reflect a better depiction of a cyberattack. For example, the Common Processing Systems (CPS) systems themselves can be further resolved into constituent components that are vulnerable to cyberattacks. Separate models can also be developed for each of the individual failure events, i.e. confidentiality, integrity, and availability, instead of combining them into one failure event as done below. The methodology for computing the MTTSF metric can be extended to other similar cybersecurity metrics, such as those formulated by the Center for Internet Security (CIS) [3], e.g. mean time to restore to operational status, etc. Additional improvements to the model can be obtained with the incorporation of the repair and restore portion of the semi-Markov chain in Figure 3, which will likely require the use of more advance modeling packages.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Models of interactive systems: a case study on programmable user modelling
    Blandford, A
    Butterworth, R
    Curzon, P
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2004, 60 (02) : 149 - 200
  • [42] Computer experiment: A case study for modelling and simulation of manufacturing systems
    Sahama, T. R.
    Diamond, N. T.
    AUSTRALIAN JOURNAL OF MECHANICAL ENGINEERING, 2009, 7 (01) : 1 - 8
  • [43] Effects of data quality and quantity in systems modelling: a case study
    Kikuchi, Shinya
    Kronprasert, Nopadon
    INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2012, 41 (07) : 697 - 711
  • [44] Online modelling of water distribution systems: A UK case study
    Machell J.
    Mounce S.R.
    Boxall J.B.
    Drinking Water Engineering and Science, 2010, 3 (01) : 21 - 27
  • [45] Online modelling of water distribution systems: A UK case study
    Machell, J.
    Mounce, S. R.
    Boxall, J. B.
    INTEGRATING WATER SYSTEMS, 2010, : 307 - 311
  • [46] Modelling supply risks in interdependent manufacturing systems: A case study
    Omega, R. S.
    Noel, V. M.
    Masbad, J. G.
    Ocampo, L. A.
    ADVANCES IN PRODUCTION ENGINEERING & MANAGEMENT, 2016, 11 (02): : 115 - 125
  • [47] A Fallback Control Study of Networked Control Systems for Cybersecurity
    Sawada, Kenji
    Sasaki, Tsubasa
    Shin, Seiichi
    Hosokawa, Shu
    2015 10TH ASIAN CONTROL CONFERENCE (ASCC), 2015,
  • [48] Availability of a SCADA/OMS/DMS System - a Case Study
    Jensen, Martin
    Sel, Cumhur
    Franke, Ulrik
    Holm, Hannes
    Nordstrom, Lars
    2010 IEEE PES CONFERENCE ON INNOVATIVE SMART GRID TECHNOLOGIES EUROPE (ISGT EUROPE), 2010,
  • [49] Migration of a SCADA system to IaaS clouds – a case study
    Philip Church
    Harald Mueller
    Caspar Ryan
    Spyridon V. Gogouvitis
    Andrzej Goscinski
    Zahir Tari
    Journal of Cloud Computing, 6
  • [50] Content blocking mechanism in cybersecurity: Slovakia case study
    Pavol Sokol
    Laura Bachňáková Rózenfeldová
    EURASIP Journal on Information Security, 2025 (1)