Model-Based Cybersecurity Analysis Extending Enterprise Modeling to Critical Infrastructure Cybersecurity

被引:8
|
作者
Jiang, Yuning [1 ,2 ]
Jeusfeld, Manfred A. [2 ]
Ding, Jianguo [3 ]
Sandahl, Elin [4 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Univ Skovde, S-54128 Skovde, Sweden
[3] Blekinge Inst Technol, S-37179 Karlskrona, Sweden
[4] Norgald AB, Langland 2B, S-41133 Gothenburg, Sweden
关键词
Critical infrastructure; Domain-specific language; Cybersecurity; Power grids; CYBER-PHYSICAL SYSTEMS; ARCHITECTURE MANAGEMENT; INFORMATION SECURITY; FAILURE ANALYSIS; INTEGRATION; FUTURE;
D O I
10.1007/s12599-023-00811-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructure (CIs) such as power grids link a plethora of physical components from many different vendors to the software systems that control them. These systems are constantly threatened by sophisticated cyber attacks. The need to improve the cybersecurity of such CIs, through holistic system modeling and vulnerability analysis, cannot be overstated. This is challenging since a CI incorporates complex data from multiple interconnected physical and computation systems. Meanwhile, exploiting vulnerabilities in different information technology (IT) and operational technology (OT) systems leads to various cascading effects due to interconnections between systems. The paper investigates the use of a comprehensive taxonomy to model such interconnections and the implied dependencies within complex CIs, bridging the knowledge gap between IT security and OT security. The complexity of CI dependence analysis is harnessed by partitioning complicated dependencies into cyber and cyber-physical functional dependencies. These defined functional dependencies further support cascade modeling for vulnerability severity assessment and identification of critical components in a complex system. On top of the proposed taxonomy, the paper further suggests power-grid reference models that enhance the reproducibility and applicability of the proposed method. The methodology followed was design science research (DSR) to support the designing and validation of the proposed artifacts. More specifically, the structural, functional adequacy, compatibility, and coverage characteristics of the proposed artifacts are evaluated through a three-fold validation (two case studies and expert interviews). The first study uses two instantiated power-grid models extracted from existing architectures and frameworks like the IEC 62351 series. The second study involves a real-world municipal power grid.
引用
收藏
页码:643 / 676
页数:34
相关论文
共 50 条
  • [21] Hierarchical Model-Based Cybersecurity Risk Assessment During System Design
    Jungebloud, Tino
    Nguyen, Nhung H.
    Kim, Dong Seong
    Zimmermann, Armin
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 30 - 44
  • [22] Functional cyber-resilience - Extending the cybersecurity paradigm in critical infrastructures
    de Haan, Johannes
    2023 IEEE/ACM 4TH INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS, ENCYCRIS, 2023, : 17 - 22
  • [23] Technical Framework Research on Critical Information Infrastructure Cybersecurity Classified Protection
    Ren Weihong
    Yuan Jing
    Jiang Lei
    Zhao Tai
    Proceedings of the 2016 4th International Conference on Machinery, Materials and Information Technology Applications, 2016, 71 : 1177 - 1181
  • [24] Securing the Future of Railway Systems: A Comprehensive Cybersecurity Strategy for Critical On-Board and Track-Side Infrastructure
    Ibadah, Nisrine
    Benavente-Peces, Cesar
    Pahl, Marc-Oliver
    SENSORS, 2024, 24 (24)
  • [25] A Design Science Approach to Constructing Critical Infrastructure and Communicating Cybersecurity Risks
    Muegge, Steven
    Craigen, Dan
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2015, : 6 - 16
  • [26] A Novel Model for Cybersecurity Economics and Analysis
    Rathod, Paresh
    Hamalainen, Timo
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2017, : 274 - 279
  • [27] Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework
    Razikin, Khairur
    Soewito, Benfano
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (03) : 383 - 404
  • [28] Building Critical Statewide Cybersecurity Capabilities: The Wisconsin Model
    Franco, Eric
    Yin, Roger
    Sankaranarayanan, Balaji
    PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE ON DIGITAL GOVERNMENT RESEARCH, DGO 2024, 2024, : 224 - 231
  • [29] Regulating risks within complex sociotechnical systems: Evidence from critical infrastructure cybersecurity standards
    Clark-Ginsberg, Aaron
    Slayton, Rebecca
    SCIENCE AND PUBLIC POLICY, 2019, 46 (03) : 339 - 346
  • [30] Digital Supply Chain Vulnerabilities in Critical Infrastructure: A Systematic Literature Review on Cybersecurity in the Energy Sector
    Aarland, Mari
    Gjosaeter, Terje
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 326 - 333