Blog
About

197
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      A Model-based Approach to Interdependency between Safety and Security in ICS

      ,

      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)

      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)

      17 - 18 September 2015

      safety, security, answer set programming, interdependency between safety and security

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Wide use of modern ICT technologies brings not only communication efficiency, but also security vulnerabilities into industrial control systems. Traditional physically-isolated systems are now required to take cyber security into consideration, which might also lead to system failures. However, integrating security and safety analysis has always been a challenging issue and the various interdependencies between them make it even more difficult, because they might mutually enhance, or undermine. The paper proposes an integrating framework to (i) formalise the desired and undesired properties to be safe(unsafe) or secure(insecure), including the dependencies between them, (ii) evaluate if a query state reaches a safe(unsafe) or secure(insecure) state, and further quantify how safe or secure the state is. In this way,we can accurately capture the benign and harmful relations between safety and security, particularly detecting and measuring conflicting impacts on them. Finally, this framework is implemented by answer set programming to enable automatic evaluation, which is demonstrated by a case study on pipeline transportation.

          Related collections

          Most cited references 19

          • Record: found
          • Abstract: not found
          • Article: not found

          A unified framework for risk and vulnerability analysis covering both safety and security

           Terje Aven (2007)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A survey of approaches combining safety and security for industrial control systems

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Potassco: The Potsdam Answer Set Solving Collection

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2015
                September 2015
                : 31-41
                Affiliations
                Institute for Security Science and Technology

                Imperial College London

                London, UK
                Article
                10.14236/ewic/ICS2015.4
                © Li et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
                ICS-CSR
                3
                Germany
                17 - 18 September 2015
                Electronic Workshops in Computing (eWiC)
                Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article