931
views
1
recommends
+1 Recommend
1 collections
    5
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Assessing Cyber-Physical Security in Industrial Control Systems

      proceedings-article

        , , , ,

      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)

      Cyber Security Research

      10th-12th September 2019

      Security metrics, cyber-physical security, AND-OR graphs, hypergraphs, MAX-SAT resolution, ICS, CPS

      Bookmark

            Abstract

            Over the last years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range of cyber-physical threats. Efficient models and techniques able to capture their complex structure and identify critical cyber-physical components are therefore essential. AND/OR graphs have proven very useful in this context as they are able to semantically grasp intricate logical interdependencies among ICS components. However, identifying critical nodes in AND/OR graphs is an NP-complete problem. In addition, ICS settings normally involve various cyber and physical security measures that simultaneously protect multiple ICS components in overlapping manners, which makes this problem even harder. In this paper, we present an extended security metric based on AND/OR hypergraphs which efficiently identifies the set of critical ICS components and security measures that should be compromised, with minimum cost (effort) for an attacker, in order to disrupt the operation of vital ICS assets. Our approach relies on MAX-SAT techniques, which we have incorporated in META4ICS, a Java-based security metric analyser for ICS. We also provide a thorough performance evaluation that shows the feasibility of our method. Finally, we illustrate our methodology through a case study in which we analyse the security posture of a realistic Water Transport Network (WTN).

            Content

            Author and article information

            Contributors
            Conference
            September 2019
            September 2019
            : 49-58
            Affiliations
            [0001]Institute for Security Science and Technology

            Imperial College London, UK
            [0002]KIOS Research and Innovation Centre of Excellence

            University of Cyprus
            [0003]Department of Electrical and Electronic Engineering

            Imperial College London, UK
            Article
            10.14236/ewic/icscsr19.7
            4ad936a3-730f-4e1b-a5e9-0bedcb390272
            © Martín Barrère et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            6th International Symposium for ICS & SCADA Cyber Security Research 2019
            ICS-CSR
            6
            Athens, Greece
            10th-12th September 2019
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            REFERENCES

            1. The Maximum Flow Network Interdiction Problem: Valid Inequalities, Integrality Gaps, and Approximability. Oper. Res. Lett 38 1 33 38 2010

            2. Tracking the Bad Guys: An Efficient Forensic Methodology To Trace Multi-step Attacks Using Core Attack Graphs 13th IEEE Int. Conf. on Network and Service Management Nov 2017

            3. 2019 Identifying Security-Critical Cyber-Physical Components in Industrial Control Systems arXiv:1905.04796 https://arxiv.org/abs/1905.04796 May 2019

            4. 1989 Hypergraphs: Combinatorics of Finite Sets North-Holland 1989

            5. The Complexity of Theorem-Proving Procedures Third Annual ACM Symposium on Theory of Computing 151 158 USA 1971

            6. CVSS, Common Vulnerability Scoring System http://www.first.org/cvss/ May 2019

            7. 2019 Global ICS & IIoT Risk Report https://cyberx-labs.com/en/risk-report-2019/ May 2019

            8. Solving MAXSAT by Solving a Sequence of Simpler SAT Instances Principles and Practice of Constraint Programming 225 239 Springer 2011

            9. Complexity and Vulnerability Analysis of Critical Infrastructures: A Methodological Approach Mathematical Problems in Eng., ID 8673143 2017

            10. Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices And/Or Graphs. Int. J. Found. Comput. Sci. 15 1 107 125 2004

            11. W32.Stuxnet Dossier. Tech. rep 2011

            12. Flows in Networks RAND Corporation, University Press 1962

            13. Cyber-Physical Systems Security - A Survey. IEEE Internet of Things 4 6 1802 1831 Dec 2017

            14. Using Faulty Flows in AND/OR Graphs to Model Survivability and Reliability in Distributed Systems 2004

            15. On the Optimal Design of Triple Modular Redundancy Logic for SRAM-based FPGAs Conference on Design, Automation and Test in Europe 2 1290 1295 2005

            16. Analysis of the Cyber Attack on the Ukrainian Power Grid. Defense Use Case, SANS ICS, EISAC. Tech. rep 2016

            17. META4ICS: Metric Analyser for Industrial Control Systems May 2019 [Online]. Available: https://github.com/mbarrere/meta4ics

            18. Reducing Vulnerability to Cyber-Physical Attacks in Water Distribution Networks Int. Workshop on Cyber-physical Sys. for Smart Water Networks 16 19 2018

            19. Battle of the Water Calibration Networks Journal of Water Resources Planning and Management 138 5 523 532 2012

            20. Use of Attack Graphs in Security Systems Journal of Computer Networks and Comms 1 1 2014

            21. Revisiting the Complexity of And/Or Graph Solution Journal of Computer and System Sciences 79 1156 1163 2013

            22. WSNs Under Attack! How Bad Is It? Evaluating Connectivity Impact Using Centrality Measures IET Conference Proceedings 2018

            23. Guide to Industrial Control Systems (ICS) Security, SP 800-82 rev2, NIST. Tech. rep. 2015

            24. Introduction to Urban Water Distribution Taylor & Francis Group UK 1 2006

            25. On the Complexity of Derivation in Propositional Calculus Studies in Constructive Maths. and Mathematical Logic, Part II 1970

            26. Network Security Metrics Springer 1 2017

            Comments

            Comment on this article