Blog
About

495
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Adaptive Modelling for Security Analysis of Networked Control Systems

      , , , , ,

      4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR)

      Cyber Security Research

      23 - 25 August 2016

      decomposition, ontology, threat analysis, system modelling, network security, reasoning, vulnerability

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Incomplete information about connectivity and functionality of elements of networked control systems is a challenging issue in applying model-based security analysis in practice. This issue can be addressed by modelling techniques providing inherent mechanisms to describe incomplete information. We present and exemplary demonstrate a new, ontology-based method to adaptively model and analyse networked control systems froma security perspective.Ourmethod allowsmodelling different parts of the systemwith different levels of detail. We include a formalism to handle incomplete information by applying iterative extension and iterative refinement of the model where necessary. By usingmachine-based reasoning on an ontologymodel of the system, security-relevant information is deduced. During this process, non-obvious attack vectors are identified using a structural analysis of the model and by connecting the model to vulnerability information.

          Related collections

          Most cited references 16

          • Record: found
          • Abstract: not found
          • Article: not found

          Pellet: A practical OWL-DL reasoner

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            HermiT: An OWL 2 Reasoner

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures

                Bookmark

                Author and article information

                Conference
                August 2016
                August 2016
                : 64-73
                Affiliations
                Beckhoff Automation GmbH & Co. KG, Nuremberg, Germany
                Fraunhofer Institute AISEC, Garching, Germany
                Article
                10.14236/ewic/ICS2016.8
                © Wolf et al. Published by BCS Learning & Development Ltd. Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                4th International Symposium for ICS & SCADA Cyber Security Research 2016
                ICS-CSR
                4
                Queen’s Belfast University, UK
                23 - 25 August 2016
                Electronic Workshops in Computing (eWiC)
                Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article