Integrating the manufacturer usage description standard in the modelling of cyber-physical systems

被引:3
作者
Matheu Garcia, Sara Nieves [1 ]
Sanchez-Cabrera, Adrian [1 ]
Schiavone, Enrico [2 ]
Skarmeta, Antonio [1 ]
机构
[1] Univ Murcia, Comp Sci Fac, Dept Informat & Commun Engn, Murcia 30100, Spain
[2] Resiltech srl, Piazza Nilde Iotti 25, I-56025 Pontedera, Italy
基金
欧盟地平线“2020”;
关键词
CPS; Modelling; MUD standard; Security; Network;
D O I
10.1016/j.csi.2023.103777
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The continuous growth of cyber-physical systems (CPS) attacks, especially due to the conflict in Ukraine, has highlighted the need for cybersecurity management mechanisms, due to the catastrophic consequences that a failure or attack on critical infrastructures such as power plants. Indeed, Gartner predicts that by 2025, 30% of critical infrastructures will suffer a cyberattack. In this context, defining the expected behaviour of the system is key to detecting and mitigating possible vulnerabilities both in the design and runtime phases. Modelling emerges as a tool that facilitates the analysis of the security offered by the system even before the system is implemented, allowing an early risk analysis. However, creating such a model is usually challenging due to its intrinsic complexity, or the reconfiguration needed after a security assessment due to a new vulnerability. The situation gets even worse when the system is a complex CPS-of-Systems, where different Constituent Systems (CS) are interconnected since cascade effects and dependencies are stronger and we might not have all the information from the third-party CS. Also, the results of the evaluation are typically used only during the design phase, thus missing out on potential security policies and mitigations that could be used during the system operation. In this sense, the Manufacturer Usage Description (MUD) allows the manufacturer to define access control policies that reduce the attack surface of a device. However, the limited expressiveness of this standard reduces the possibilities of its application in systems with more complex policies beyond the network level. We propose the usage of the MUD standard as a source of information for CPS modelling, providing information on interactions about third-party components of the system. In addition, we define an extended MUD model that deals with the expressiveness problems of the MUD and allows to automatically generate a behavioural profile that integrates the recommendations obtained from the assessment and modelling processes. The extended MUD could be used during runtime to reduce the attack surface of the system, enforce security configuration or even discern if a component is secure enough to be part of the ecosystem. Our approach has been validated in a real use case in the context of smart grid, to show its applicability.
引用
收藏
页数:13
相关论文
共 58 条
  • [1] Model-based testing using UML activity diagrams: A systematic mapping study
    Ahmad, Tanwir
    Iqbal, Junaid
    Ashraf, Adnan
    Truscan, Dragos
    Porres, Ivan
    [J]. COMPUTER SCIENCE REVIEW, 2019, 33 : 98 - 112
  • [2] Towards Secure Smart Home IoT: Manufacturer and User Network Access Control Framework
    Al-Shaboti, Mohammed
    Welch, Ian
    Chen, Aaron
    Mahmood, Muhammad Adeel
    [J]. PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 892 - 899
  • [3] Andalibi V, 2021, Arxiv, DOI [arXiv:2107.06372, 10.48550/arXiv.2107.06372, DOI 10.48550/ARXIV.2107.06372]
  • [4] Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD)
    Andalibi, Vafa
    Dev, Jayati
    Kim, DongInn
    Lear, Eliot
    Camp, L. Jean
    [J]. 37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 337 - 348
  • [5] [Anonymous], 2022, SOFTW BILL MAT
  • [6] [Anonymous], 2012, Guide for conducting risk assessments (NIST Special Publication No. 800-30), DOI DOI 10.6028/NIST.SP.800-30R1
  • [7] [Anonymous], 2023, DISC ACC SOFTW BILLS
  • [8] [Anonymous], 2016, Directive (EU) 2016/1148 of the European Parliament and of the Council
  • [9] [Anonymous], Common Vulnerability Scoring System v3.0: Specification Document
  • [10] [Anonymous], 2019, RFC8519