Industrial Control System Availability Assessment with a Metric Based on Delay and Dependency

被引:1
作者
Baybulatov, A. A. [1 ]
Promyslov, V. G. [1 ]
机构
[1] Russian Acad Sci, VA Trapeznikov Inst Control Sci, Moscow, Russia
关键词
industrial control system; availability; metric; delay; dependency; software; risk;
D O I
10.1016/j.ifacol.2021.10.493
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Analyzing safety and security of modern integrated enterprises, one can realize that for industrial control systems, availability is much more critical than other properties composing the classic security triad. However, it is not availability but confidentiality and integrity that are usually more concerned and adequately described in security policies. Furthermore, for assessing and maintaining system security, a number of formal models are utilized, but none of them corresponds directly to availability. The article considers the property of availability of industrial control systems, suggests adopting the IEC 62443 availability interpretation, and reveals a delay of the signal transmission to be a useful measure of the quantitative availability assessment. Investigating the software level of industrial control systems, the article presents a scheme of domains affecting availability and advocates utilizing a system dependency for making availability assessment more accurate and universal. As a result of the research, the article proposes a metric based on delay and dependency, which is helpful for the safety and risk engineering at both the design and operational stages. Copyright (C) 2021 The Authors.
引用
收藏
页码:472 / 476
页数:5
相关论文
共 22 条
[1]  
Andress J., 2014, The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, V2nd, P69
[2]  
[Anonymous], 2005, Introduction to Computer Security
[3]  
[Anonymous], 2014, 62645 IEC
[4]  
[Anonymous], 2009, 6244311 IEC
[5]   I&C System Availability Assessment Using Upper Bound Delay Estimation [J].
Baybulatov, A. A. ;
Poletykin, A. G. ;
Promyslov, G. V. ;
Shipilov, D. V. .
IFAC PAPERSONLINE, 2019, 52 (13) :940-944
[6]  
Baybulatov A.A, 2013, IFAC P VOLUMES, V46, P1091
[7]  
Black P.Scarfone., 2008, Wiley Handbook of Science and Technology for Homeland Security
[8]   What's in a Name? Metaphors and Cybersecurity [J].
Branch, Jordan .
INTERNATIONAL ORGANIZATION, 2021, 75 (01) :39-70
[9]  
Denning D., 1999, National Computer Systems Security Award Acceptance Speech
[10]  
Ginter A., 2018, SECURE OPERATIONS TE