Blog
About

168
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      A SysML Extension for Security Analysis of Industrial Control Systems

      , , ,

      2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014) (ICSCSR)

      ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)

      11-12 September 2014

      Industrial control systems security, SysML

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The security of Industrial Control Systems (ICS) has become an important topic. Recent attacks have shown that inadequately protecting control systems could have disastrous consequences for society.

          This paper presents an extension for the Systems Modeling Language (SysML), allowing for the extraction of vulnerabilities from an industrial control system model. After a control system is modeled in SysML, the model is converted into input for a formal reasoning tool. This tool contains a logic theory which is used for the vulnerability extraction. The rules in this logic theory are inferred from the ICS-CERT vulnerability database and ICS security standards. Once the vulnerabilities have been extracted, they are included in the SysML diagrams of the model.

          The modeling approach allows the user to quickly see which changes to the system get rid of the reported vulnerabilities. It is also possible to mark certain components as compromised to see the consequences of attacks on these components for system security as a whole. The resulting analysis can be used to strengthen the security of the control system.

          Related collections

          Most cited references 4

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          A Taxonomy of Cyber Attacks on SCADA Systems

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Introduction to Industrial Control Networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Review of Security Issues in Industrial Networks

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2014
                September 2014
                : 1-9
                Affiliations
                KU Leuven

                Department of Industrial Engineering

                Gebroeders Desmetstraat 1, 9000 Ghent, Belgium
                KU Leuven

                iMinds-DistriNet

                Celestijnenlaan 200A, 3001 Heverlee, Belgium
                Article
                10.14236/ewic/ICSCSR2014.1
                © Laurens Lemaire et al. Published by BCS Learning and Development Ltd. 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014), St Pölten, Austria

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
                ICSCSR
                2
                St Pölten, Austria
                11-12 September 2014
                Electronic Workshops in Computing (eWiC)
                ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article