MODELING AND SIMULATION APPROACHES FOR CYBERSECURITY IMPACT ANALYSIS: STATE-OF-THE-ART

被引:0
作者
Jawad, Alvi [1 ]
Jaskolka, Jason [1 ]
机构
[1] Carleton Univ, Dept Syst & Comp Engn, 1125 Colonel By Dr, Ottawa, ON, Canada
来源
PROCEEDINGS OF THE 2021 ANNUAL MODELING AND SIMULATION CONFERENCE (ANNSIM'21) | 2020年
基金
加拿大自然科学与工程研究理事会;
关键词
impact analysis; cybersecurity; industrial control systems; cyber-physical systems; survey; SECURITY; ATTACKS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Designing resilient critical infrastructures involves ensuring the secure operation of the underlying systems and their components. Due to the ever-increasing integration of cyber components to monitor and control physical processes in such systems, cyberattacks can not only compromise the cyberinfrastructure but can also disrupt, delay, or thwart the physical processes and operations. Thus, a comprehensive cybersecurity assessment framework mandates analyzing the potential impact that successful exploits may have on such systems. In this paper, we survey the existing literature to aggregate the diverse modeling and simulation-based approaches that have been used to define and/or characterize the impact of attacks on cyber-physical and industrial control systems. The resulting analysis provides insight into the varying definitions of impact and domains of application, providing recommendations to guide future impact analysis studies.
引用
收藏
页数:12
相关论文
共 35 条
[1]   A THEORY OF TIMED AUTOMATA [J].
ALUR, R ;
DILL, DL .
THEORETICAL COMPUTER SCIENCE, 1994, 126 (02) :183-235
[2]  
Ani U D., Int Conf Cyber Secur Prot Digit Serv Cyber Secur 2020, P2020, DOI [10.1109/CyberSecurity49315.2020.9138886, DOI 10.1109/CYBERSECURITY49315.2020.9138886]
[3]  
[Anonymous], 2013, Reliability Assessment of Electric Power Systems Using Monte Carlo Methods
[4]  
Cam H, 2014, 2014 IEEE INTERNATIONAL INTER-DISCIPLINARY CONFERENCE ON COGNITIVE METHODS IN SITUATION AWARENESS AND DECISION SUPPORT (COGSIMA), P181, DOI 10.1109/CogSIMA.2014.6816560
[5]  
Chen B., 2013, NORTH AMER POW SYMP, P1, DOI 10.1109/NAPS.2013.6666849
[6]  
Chenaru O, 2017, MED C CONTR AUTOMAT, P1089, DOI 10.1109/MED.2017.7984263
[7]  
Christiansson H, 2008, INT FED INFO PROC, V253, P237
[8]  
Clarke E. M., 2012, TOOLS PRACTICAL SOFT, P1, DOI [DOI 10.1007/978-3-642-35746-6_1, 10.1007/978-3-642-35746-61]
[9]  
Dagle J, 2001, 2001 IEEE POWER ENGINEERING SOCIETY WINTER MEETING, CONFERENCE PROCEEDINGS, VOLS 1-3, P108, DOI 10.1109/PESW.2001.917009
[10]   A framework to assess impacts of cyber attacks in manufacturing [J].
Giehl, Alexander ;
Wiedermann, Norbert ;
Plaga, Sven .
PROCEEDINGS OF 2019 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2019), 2019, :127-132