PatchRank: Ordering updates for SCADA systems

被引:0
作者
Yadav, Geeta [1 ]
Paul, Kolin [1 ,2 ]
机构
[1] IIT Delhi, Khosla Sch Informat Technol, New Delhi, India
[2] TalTech, Sch Informat Technol, Tallinn, Estonia
来源
2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA) | 2019年
关键词
SCADA; Risk management; Patch ranking; CVSS; Game Theory; Viable System Model;
D O I
10.1109/etfa.2019.8869110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing SCADA is a challenging task for the research community as well as the industry. SCADA networks form the basis of industrial productivity. Industry 4.0 is likely to see more expansive use of SCADA & IIoT for enhanced productivity. These complex systems consist of numerous vulnerable subsystems. It is challenging for the timely application of patches to all the vulnerabilities, due to resource constraints and the high cost of the patch process. Usually, the more severe (attack probable) weaknesses are patched first to secure the system. Often organizations ignore the vulnerabilities in the "critical" node in favor of securing a vulnerability in an isolated subsystem. Therefore, the sequence in which patches are applied needs to be prioritized. State of the art indicates that patch prioritization is primarily an art rather than any significant methodology being followed. This paper proposes PatchRank - a patch prioritization method for the SCADA systems based on Viable System Model, Common Vulnerability Scoring System, and Game theory. PatchRank provides a ranking of vulnerable nodes/ subsystems as well as a ranking of subsystem vulnerabilities, thereby allowing well-formed strategies for patch management. This paper also proposes a "Usable Secure State" to define a security assurance level. A comparative analysis of PatchRank with other benchmark algorithms, i.e., SecureRank, CVSS, and density based prioritization shows that PatchRank converges to a usable secure state faster.
引用
收藏
页码:110 / 117
页数:8
相关论文
共 15 条
[1]  
Allodi L., 2013, CORR
[2]  
Alpcan Tansu, 2009, 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), P113, DOI 10.1109/CRISIS.2009.5411969
[3]  
[Anonymous], 1972, BRAIN FIRM MANAGERIA
[4]  
CERT-UK, VULN PATCH MAN
[5]   Game Theory and Risk Analysis [J].
Cox, Louis Anthony , Jr. .
RISK ANALYSIS, 2009, 29 (08) :1062-1068
[6]  
Frühwirth C, 2009, INT SYMP EMP SOFTWAR, P536
[7]  
Gianini G, 2015, 2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY RESEARCH (ICTRC), P88, DOI 10.1109/ICTRC.2015.7156428
[8]   Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols [J].
Lahza, Hassan ;
Radke, Kenneth ;
Foo, Ernest .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 20 :48-67
[9]  
Maghrabi L., 2016, 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Cyber Security and Protection of Digital Services (Cyber Security), 2016 International Conference On, P1, DOI [10.1109/CyberSecPODS.2016.7502351, DOI 10.1109/CYBERSECPODS.2016.7502351]
[10]  
Maghrabi Louai., 2017, 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), P1