Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

被引:11
作者
Chockalingam, Sabarathinam [1 ,2 ]
Pieters, Wolter [1 ,3 ]
Teixeira, Andre [4 ]
van Gelder, Pieter [1 ]
机构
[1] Delft Univ Technol, Fac Technol Policy & Management, Delft, Netherlands
[2] Inst Energy Technol, Dept Risk Safety & Secur, Halden, Norway
[3] Radboud Univ Nijmegen, Behav Sci Inst, Nijmegen, Netherlands
[4] Uppsala Univ, Dept Elect Engn, Uppsala, Sweden
关键词
Bayesian network; DeMorgan model; Intentional attack; Probability elicitation; Safety; Security; Technical failure; Water management; EXPERT ELICITATION; DIAGNOSIS; PREDICTION; SECURITY;
D O I
10.1186/s42400-021-00086-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused by both (intentional) attacks and (accidental) technical failures. When operators notice abnormal behaviour, they should be able to distinguish between those two causes to take appropriate measures, because for example replacing a sensor in case of intentional incorrect sensor measurements would be ineffective and would not block corresponding the attack vector. In the previous work, we developed the attack-failure distinguisher framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two causes, including the knowledge elicitation method to construct the directed acyclic graph and conditional probability tables of BN models. As a full case study of the attack-failure distinguisher framework, this paper presents a BN model constructed to distinguish between attacks and technical failures for the problem of incorrect sensor measurements in floodgates, addressing the problem of floodgate operators. We utilised experts who associate themselves with the safety and/or security community to construct the BN model and validate the qualitative part of constructed BN model. The constructed BN model is usable in water management infrastructures to distinguish between intentional attacks and accidental technical failures in case of incorrect sensor measurements. This could help to decide on appropriate response strategies and avoid further complications in case of incorrect sensor measurements.
引用
收藏
页数:19
相关论文
共 61 条
[21]  
Greitzer F.L., 2010, Identifying at-Risk Employees: A Behavioral Model for Predicting Potential Insider Threats
[22]  
Greitzer FL, 2012, 2012 45 HAW INT C SY
[23]   Expert elicitation of a navigation service implementation effects on ship groundings and collisions in the Gulf of Finland [J].
Hanninen, Maria ;
Mazaheri, Arsham ;
Kujala, Pentti ;
Montewka, Jakub ;
Laaksonen, Pekka ;
Salmiovirta, Maija ;
Klang, Mikko .
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART O-JOURNAL OF RISK AND RELIABILITY, 2014, 228 (01) :19-28
[24]  
Herland K., 2016, J CYBER SECUR MOBIL, V4, P65
[25]  
Holm H., 2013, 22 INT C EXH EL DIST
[26]   A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits [J].
Holm, Hannes ;
Korman, Matus ;
Ekstedt, Mathias .
INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 58 :304-318
[27]   Probability based vehicle fault diagnosis: Bayesian network method [J].
Huang, Yingping ;
McMurran, Ross ;
Dhadyalla, Gunwant ;
Jones, R. Peter .
JOURNAL OF INTELLIGENT MANUFACTURING, 2008, 19 (03) :301-311
[28]   Survey of Attack Projection, Prediction, and Forecasting in Cyber Security [J].
Husak, Martin ;
Komarkova, Jana ;
Bou-Harb, Elias ;
Celeda, Pavel .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01) :640-660
[29]   MODELING INFORMATION SYSTEM AVAILABILITY BY USING BAYESIAN BELIEF NETWORK APPROACH [J].
Ibrahimovic, Semir ;
Bajgoric, Nijaz .
INTERDISCIPLINARY DESCRIPTION OF COMPLEX SYSTEMS, 2016, 14 (02) :125-138
[30]  
Jacobs F, 2018, THESIS DELFT U TECHN