Combining Artificial Intelligence planning advantages to assist preliminary formal analysis on Industrial Control System cybersecurity vulnerabilities

被引:0
作者
Lou, Xinxin [1 ]
Waedt, Karl [2 ]
Gao, Yuan [3 ]
Ben Zid, Ines [1 ]
Watson, Venesa [4 ]
机构
[1] Bielefeld Univ, Bielefeld, Germany
[2] Framatome GmbH, Erlangen, Germany
[3] Otto von Guericke Univ, Magdeburg, Germany
[4] Univ Siegen, Siegen, Germany
来源
PROCEEDINGS OF THE 2018 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI) | 2018年
关键词
formal specification; Artificial Intelligence; cybersecurity analysis; refueling machine; refueling system; safety critical system; Nuclear Power Plant;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper provides a novel and practical approach, to check the correctness and completeness of functional specifications (the completeness means complete for one specified function), especially for complex safety critical systems. This approach combines Artificial Intelligence (AI) planning technique, together with formal functional specification, to assist further cybersecurity vulnerability analysis on safety critical Industrial Control System (ICS). The effectiveness of this combination is represented by examples, which are based on a safety critical ICS-Refueling Machine (RM). RMs are widely used in Nuclear Power Plants (NPPs). The outcome of this idea is a correct and complete functional specification of specific functions, which is the key foundation for our further safety and security vulnerability analysis, especially for performing analysis based on model checking. This practical checking approach is applicable to further Instrumentation & Control (I&C) systems and platforms.
引用
收藏
页数:8
相关论文
共 33 条
  • [1] Alrajeh N. A., 2013, INT J DISTRIB SENS N, V9
  • [2] Robot Planning in the Real World: Research Challenges and Opportunities
    Alterovitz, Ron
    Koenig, Sven
    Likhachev, Maxim
    [J]. AI MAGAZINE, 2016, 37 (02) : 76 - 84
  • [3] [Anonymous], 2010, P 3 ANN S COMB SEACH
  • [4] [Anonymous], 2015, DRAFT SPEC PUBL, V800-82
  • [5] [Anonymous], 1994, Proceedings of the Second International Conference on Artificial Intelligence Planning Systems AIPS
  • [6] Artificial intelligence in database security
    Bai, Y
    Zhang, Y
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2004, 18 (01) : 3 - 17
  • [7] Braynov S., 2003, Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, P43
  • [8] Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access
    Cheminod, Manuel
    Pironti, Alfredo
    Sisto, Riccardo
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (01) : 30 - 40
  • [9] Lessons from Stuxnet
    Chen, Thomas M.
    Abu-Nimeh, Saeed
    [J]. COMPUTER, 2011, 44 (04) : 91 - 93
  • [10] A review of cyber security risk assessment methods for SCADA systems
    Cherdantseva, Yulia
    Burnap, Pete
    Blyth, Andrew
    Eden, Peter
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    [J]. COMPUTERS & SECURITY, 2016, 56 : 1 - 27