Model-Based Cybersecurity Analysis Extending Enterprise Modeling to Critical Infrastructure Cybersecurity

被引:8
|
作者
Jiang, Yuning [1 ,2 ]
Jeusfeld, Manfred A. [2 ]
Ding, Jianguo [3 ]
Sandahl, Elin [4 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Univ Skovde, S-54128 Skovde, Sweden
[3] Blekinge Inst Technol, S-37179 Karlskrona, Sweden
[4] Norgald AB, Langland 2B, S-41133 Gothenburg, Sweden
关键词
Critical infrastructure; Domain-specific language; Cybersecurity; Power grids; CYBER-PHYSICAL SYSTEMS; ARCHITECTURE MANAGEMENT; INFORMATION SECURITY; FAILURE ANALYSIS; INTEGRATION; FUTURE;
D O I
10.1007/s12599-023-00811-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructure (CIs) such as power grids link a plethora of physical components from many different vendors to the software systems that control them. These systems are constantly threatened by sophisticated cyber attacks. The need to improve the cybersecurity of such CIs, through holistic system modeling and vulnerability analysis, cannot be overstated. This is challenging since a CI incorporates complex data from multiple interconnected physical and computation systems. Meanwhile, exploiting vulnerabilities in different information technology (IT) and operational technology (OT) systems leads to various cascading effects due to interconnections between systems. The paper investigates the use of a comprehensive taxonomy to model such interconnections and the implied dependencies within complex CIs, bridging the knowledge gap between IT security and OT security. The complexity of CI dependence analysis is harnessed by partitioning complicated dependencies into cyber and cyber-physical functional dependencies. These defined functional dependencies further support cascade modeling for vulnerability severity assessment and identification of critical components in a complex system. On top of the proposed taxonomy, the paper further suggests power-grid reference models that enhance the reproducibility and applicability of the proposed method. The methodology followed was design science research (DSR) to support the designing and validation of the proposed artifacts. More specifically, the structural, functional adequacy, compatibility, and coverage characteristics of the proposed artifacts are evaluated through a three-fold validation (two case studies and expert interviews). The first study uses two instantiated power-grid models extracted from existing architectures and frameworks like the IEC 62351 series. The second study involves a real-world municipal power grid.
引用
收藏
页码:643 / 676
页数:34
相关论文
共 50 条
  • [31] Cybersecurity infrastructure challenges in IoT based virtual power plants
    Venkatachary, Sampath Kumar
    Prasad, Jagdish
    Samikannu, Ravi
    Alagappan, Annamalai
    Andrews, Leo John Baptist
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2020, 23 (02) : 263 - 276
  • [32] Cost and Cybersecurity Challenges in the Commissioning of Microgrids in Critical Infrastructure: COGE Case Study
    Kraemer, Rodrigo Antonio Sbardeloto
    Dias, Douglas Pereira
    da Silva, Alisson Carlos
    Martins, Marcos Aurelio Izumida
    Ludwig, Mathias Arno
    ENERGIES, 2022, 15 (08)
  • [33] Cybersecurity in the Context of Criminal Law Protection of the State Security and Sectors of Critical Infrastructure
    Kelemen, Miroslav
    Szabo, Stanislav
    Vajdova, Iveta
    CHALLENGES TO NATIONAL DEFENCE IN CONTEMPORARY GEOPOLITICAL SITUATION (CNDCGS' 2018), 2018, : 100 - 104
  • [34] Beyond "Complacency and Panic": Will the NIS Directive Improve the Cybersecurity of Critical National Infrastructure?
    Michels, Johan David
    Walden, Ian
    EUROPEAN LAW REVIEW, 2020, 45 (01) : 25 - 47
  • [35] Cybersecurity Integration: Deploying Critical Infrastructure Security and Resilience Topics into the Undergraduate Curriculum
    Lunn, Stephanie
    Ross, Monique
    Liu, Jason
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 866 - 871
  • [36] A Novel AI-Based Integrated Cybersecurity Risk Assessment Framework and Resilience of National Critical Infrastructure
    Ali, Sardar Muhammad
    Razzaque, Abdul
    Yousaf, Muhammad
    Ali, Sardar Sadaqat
    IEEE ACCESS, 2025, 13 : 12427 - 12446
  • [37] Assets focus risk management framework for critical infrastructure cybersecurity risk management
    Kure, Halima Ibrahim
    Islam, Shareeful
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2019, 4 (04) : 332 - 340
  • [38] The Insecurity of Innovation: A Critical Analysis of Cybersecurity in the United States
    Hart, Catherine
    Jin, Dal Yong
    Feenberg, Andrew
    International Journal of Communication, 2014, 8 : 2860 - 2878
  • [39] Economic Impacts of Rules-versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers
    Massacci, Fabio
    Ruprai, Raminder
    Collinson, Matthew
    Williams, Julian
    IEEE SECURITY & PRIVACY, 2016, 14 (03) : 52 - 60
  • [40] MODELING AND SIMULATION APPROACHES FOR CYBERSECURITY IMPACT ANALYSIS: STATE-OF-THE-ART
    Jawad, Alvi
    Jaskolka, Jason
    PROCEEDINGS OF THE 2021 ANNUAL MODELING AND SIMULATION CONFERENCE (ANNSIM'21), 2020,