3,013
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Ontology and life cycle of knowledge for ICS security assessments

      proceedings-article
      , ,
      4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR)
      Cyber Security Research
      23 - 25 August 2016
      ICS Security, Security Ontology, Security Knowledge, Knowledge Life Cycle.
      Bookmark

            Abstract

            Industrial Control Systems (ICS) succumb to an ever evolving variety of threats. Additionally, threats are increasing in number and get more complex. This requires a holistic and up-to-date security concept for ICS as a whole. Usually security concepts are applied and updated based on regularly performed ICS security assessments. Such ICS security assessments require high effort and extensive knowledge about ICS and its security. This is often a problem for small and mediumsized enterprises (SME), which do not have sufficient respective sufficiently skilled human resources. This paper defines in a first step requirements on the knowledge needed to perform an ICS security assessment and the life cycle of this knowledge. Afterwards the ICS security knowledge and its life cycle are developed and discussed considering the requirements and related work.

            Content

            Author and article information

            Contributors
            Conference
            October 2016
            October 2016
            : 32-41
            Affiliations
            [0001]Faculty I – Electrical Engineering and Information Technology, University of Applied Sciences and Arts Hannover, Ricklinger Stadtweg 120, 30459 Hannover, Germany
            [0002]Institute of Automation Technology, Helmut Schmidt University / University of the Federal Armed Forces, Holstenhofweg 85, 22043 Hamburg, Germany
            Article
            10.14236/ewic/ICS2016.5
            d275dcfd-c827-415b-b97e-0d43c092f5cb
            © Tebbe et al. Published byBCS Learning & Development Ltd.Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            4th International Symposium for ICS & SCADA Cyber Security Research 2016
            ICS-CSR
            4
            Queen’s Belfast University, UK
            23 - 25 August 2016
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICS2016.5
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            ICS Security,Security Ontology,Security Knowledge,Knowledge Life Cycle.

            REFERENCES

            1. 2010 Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management Third International Conference on Dependability (DEPEND) Venice, Italy 18-25 07 2010 92 97

            2. et al 2014 Theoretical model of knowledge management in SMEs life cycle: (A literature study) 2nd International Conference on Technology, Informatics, Management, Engineering & Environment Bandung, Indonesia 19-21 08 2014 351 356

            3. 2011 A Semantic Model for Cyber Security Grid-Interop Proceedings: Implementing Interoperability,Advancing Smart Grid Standards, Architecture and Community Phoenix, AZ, USA 05-08 12 2011

            4. 2007 Towards a Taxonomy of Vulnerabilities 40th Annual Hawaii International Conference on System Sciences (HICSS) Waikoloa, Hawaii, USA Jan 2007

            5. et al 2011 Basis for an integrated security ontology according to a systematic review of existing proposals Computer Standards & Interfaces 33 4 372 388

            6. 2011 INSPIRE Ontology Handler: Automatically building and managing a knowledge base for Critical Information Infrastructure protection Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on Dublin, Ireland 23-27 05 2011 694 697

            7. Bundesamt für Sicherheit in der Informationstechnik (BSI) 2013 ICS-Security-Kompendium

            8. et al 2010aDecision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis Critical Information Infrastructures Security: Revised Papers of 4th International Workshop Bonn, Germany 30 09-02 10 2009 98 110

            9. et al 2010bOntology Applied in Decision Support System for Critical Infrastructures Protection Trends in applied intelligent systems: 23rd International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, Proceedings part 1 Cordoba, Spain 01-06 2010 671 680

            10. DIN ISO/IEC TR 27019 2015 Informationstechnik - Sicherheitsverfahren - Leitfaden für das Informationssicherheitsmanagement von Steuerungssystemen der Energieversorgung auf Grundlage der ISO/IEC 27002 (ISO/IEC TR 27019:2014) Berlin Beuth Verlag GmbH

            11. et al 2014 A Holistic View of the Knowledge Life Cycle: The KnowledgeManagementCycle (KMC) Model Electronic Journal of Knowledge Management 12 2 85 97

            12. 2009 Formalizing information security knowledge 4th International Symposium on Information, Computer, and Communications Security: Proceedings Sydney, NSW, Australia 10-12 03 2009 183 194

            13. 2007 An Ontology of Information Security International Journal of Information Security and Privacy 1 4 1 23

            14. Homeland Security and CPNI 2010 Cyber Security Assessments of Industrial Control Systems: Good Practice Guide

            15. 2014 Managing the knowledge lifecycle: A integrated knowledge management process model 4th International eConference on Computer and Knowledge Engineering (ICCKE) Mashhad, Iran 29-30 08 2014 102 110

            16. ISA 62443-1-1 2015aSecurity for Industrial Automation and Control Systems - Models and Concepts. Draft 5, Edit 5

            17. ISA-62443-2-1 2015bSecurity for industrial automation and control systems - Part 2-1: Industrial automation and control system security management system. Draft 7, Edit 5

            18. ISA-62443-3-2 2015cIndustrial communication networks - Network and system security - Part 32: Security risk assessment and system design. Draft 6, Edit 3

            19. ISO/IEC 27001 2013 Information technology -Security techniques - Information security management systems - Requirements Second

            20. 2015 Development of cyber security testbed for critical infrastructure International Conference on Military Communications and Information Systems (ICMCIS) Cracow, Poland 18-19 05 2015 1 10

            21. et al 2009 Collaboration in security assessments for critical infrastructures Fourth International Conference on Critical Infrastructures (CRIS) Linköping, Sweden 28-30 April 2009 1 7

            22. et al 2014 Evaluation of security solutions in the SCADA environment SIGMIS Database 45 1 38 53

            23. et al 2014 A SysML Extension for Security Analysis of Industrial Control Systems 2nd International Symposium for ICS & SCADA Cyber Security Research 2014: Proceedings St. Pölten, Austria 11-12 Sep 2014

            24. et al 2015 Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System 3rd International Symposium for ICS & SCADA Cyber Security Research: Proceedings Ingolstadt, Deutschland 17z-18 Sep 2015

            25. et al 2010 A Generic Metamodel for IT Security Attack Modeling for Distributed Systems 10th International Conference on Availability, Reliability, and Security Krakau, Poland 15-18 02 2010 430 437

            26. NE 153 2015 Automation Security 2020 - Design, Implementierung und Betrieb industrieller Automatisierungssysteme

            27. 2011 Ontologies and Information Systems: A Literature Survey, DSTO-TN-1002 Edinburgh, South Australia 5111, Australia

            28. NIST Computer Security Division (CSD) 2013 NIST SP 800-53 Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations National Institute of Standards and Technology

            29. et al 2013 Practical Extensions of Safety Critical Engineering Processes for Securing Industrial Control Systems 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013 Cardiff, UK 16-17 10 2013 2

            30. et al 2012 Developing an Ontology of the Cyber Security Domain Proceedings of the Seventh International Conference on Semantic Technologies for Intelligence, Defense, and Security Fairfax, VA USA 23-26 10 2012

            31. 2006 The Ontology Spectrum Semantic Models 12. Januar. MITRE Corporation - Information Semantics Group http://ontolog.cim3.net/file/resource/presentation/ LeoObrst_20060112/OntologySpectrumSemanti cModels-LeoObrst_20060112.ppt 21 April 2016

            32. et al 2013 Cyber security lifecycle and assessment technique for FPGA-based I&C systems 11th East-West Design and Test Symposium Rostov-on-Don, Russia 27-30 09 2013 1 5

            33. et al 2002 The Suggested Upper Merged Ontology: A Large Ontology for the Semantic Web and its Applications Proceedings of the Eighteenth National Conference on Artificial Intelligence Edmonton, Alberta, USA 28 07-01 08 2002

            34. et al 2015 Cyber Security Maintenance for SCADA Systems Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research Ingolstadt, Germany 17-18 09 2015

            35. et al 2005 A knowledge-based approach to network security: applying Cyc in the domain of network risk assessment Proceedings of the Seventeenth Conference on innovative applications of Artificial Intelligence Edmonton, Alberta, USA 09-13 07 2005 1563 1568

            36. 2014 Revisiting Security Ontologies IJCSI International Journal of Computer Science Issues 11 6 150 159

            37. 2010 Ontologies for modeling enterprise level security metrics Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research Oak Ridge, Tennessee, USA 21-23 04 2010

            38. et al 2015 The information systems’ security level assessment model based on an ontology and evidential reasoning approach Computers & Security 55 100 112

            39. et al 2015 A Security Ontology for Security Requirements Elicitation Engineering Secure Software and Systems: Proceedings of 7th International Symposium Milan Italy 04-06 03 2015 157 177

            40. et al 2015 Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC) 800 82 2 National Institute of Standards and Technology

            41. 2006 Towards an Ontology-based Security Management 20th International Conference on Advanced Information Networking and Applications -Volume 1 (AINA’06) Vienna, Austria 18-20 2006 985 992

            42. VDI/VDE 2182 Blatt 1 2011 Informationssicherheit in der industriellen Automatisierung - Allgemeines Vorgehensmodell. Edit 3 Berlin Beuth Verlag GmbH

            Comments

            Comment on this article