Dependency-based security risk assessment for cyber-physical systems

被引:14
作者
Akbarzadeh, Aida [1 ]
Katsikas, Sokratis K. [1 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Gjovik, Norway
基金
芬兰科学院;
关键词
Cyber-physical systems; Attack path analysis; Risk assessment; Safety; Security; Industrial control systems; Industry; 4; 0;
D O I
10.1007/s10207-022-00608-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cyber-physical attack is a security breach in cyber space that impacts on the physical environment. The number and diversity of such attacks against Cyber-Physical Systems (CPSs) are increasing at impressive rates. In times of Industry 4.0 and Cyber-Physical Systems, providing security against cyber-physical attacks is a serious challenge which calls for cybersecurity risk assessment methods capable of investigating the tight interactions and interdependencies between the cyber and the physical components in such systems. However, existing risk assessment methods do not consider this specific characteristic of CPSs. In this paper, we propose a dependency-based, domain-agnostic cybersecurity risk assessment method that leverages a model of the CPS under study that captures dependencies among the system components. The proposed method identifies possible attack paths against critical components of a CPS by taking an attacker's viewpoint and prioritizes these paths according to their risk to materialize, thus allowing the defenders to define efficient security controls. We illustrate the workings of the proposed method by applying it to a case study of a CPS in the energy domain, and we highlight the advantages that the proposed method offers when used to assess cybersecurity risks in CPSs.
引用
收藏
页码:563 / 578
页数:16
相关论文
共 42 条
[1]  
Abrams Marshall., 2008, Malicious Control System Cyber Security Attack Case Study-Maroochy Water Services, Australia
[2]   A Survey of Cyber-Physical Attacks and Detection Methods in Smart Water Distribution Systems [J].
Addeen, Hajar Hameed ;
Xiao, Yang ;
Li, Jiacheng ;
Guizani, Mohsen .
IEEE ACCESS, 2021, 9 :99905-99921
[3]  
Akbarzadeh A., 2020, P IEEE ACM 42 INT C, P230, DOI DOI 10.1145/3387940.3391473
[4]  
Akbarzadeh A., 2019, 2019 IEEE C INF COMM, P1, DOI DOI 10.1109/CICT48419.2019.9066188
[5]   Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems [J].
Akbarzadeh, Aida ;
Katsikas, Sokratis .
SENSORS, 2021, 21 (05) :1-23
[6]  
Alberts C., 2002, Managing information security risks: The OCTAVE approach
[7]   Analysis of requirements for critical control systems [J].
Alcaraz, Cristina ;
Lopez, Javier .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) :137-145
[8]   Secure SCADA framework for the protection of energy control systems [J].
Alcaraz, Cristina ;
Lopez, Javier ;
Zhou, Jianying ;
Roman, Rodrigo .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12) :1431-1442
[9]  
Ali S., 2018, REQUIREMENT CHANGE M, P11
[10]  
[Anonymous], 2007, Power systems management and associated information exchange-Data and communications security. Part 1: Communication network and system security Introduction to security issues