Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems

被引:12
作者
Castellanos, John H. [1 ]
Ochoa, Martin [2 ]
Zhou, Jianying [1 ]
机构
[1] Singapore Univ Technol & Design, Singapore, Singapore
[2] Univ Rosario, Dept Appl Math & Comp Sci, Bogota, Colombia
来源
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018) | 2018年
关键词
Cyber-Physical Systems; ICS Security; Information flow; INFORMATION-FLOW;
D O I
10.1145/3274694.3274745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In modern societies, critical services such as transportation, power supply, water treatment and distribution are strongly dependent on Industrial Control Systems (ICS). As technology moves along, new features improve services provided by such ICS. On the other hand, this progress also introduces new risks of cyber attacks due to the multiple direct and indirect dependencies between cyber and physical components of such systems. Performing rigorous security tests and risk analysis in these critical systems is thus a challenging task, because of the non-trivial interactions between digital and physical assets and the domain-specific knowledge necessary to analyse a particular system. In this work, we propose a methodology to model and analyse a System Under Test (SUT) as a data flow graph that highlights interactions among internal entities throughout the SUT. This model is automatically extracted from production code available in Programmable Logic Controllers (PLCs). We also propose a reachability algorithm and an attack diagram that will emphasize the dependencies between cyber and physical domains, thus enabling a human analyst to gauge various attack vectors that arise from subtle dependencies in data and information propagation. We test our methodology in a functional water treatment testbed and demonstrate how an analyst could make use of our designed attack diagrams to reason on possible threats to various targets of the SUT.
引用
收藏
页码:582 / 594
页数:13
相关论文
共 50 条
[31]   Model Based Testing of Cyber-Physical Systems [J].
Khoo, Teck Ping .
FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 :423-426
[32]   Adaptive Control for Security and Resilience of Networked Cyber-Physical Systems: Where Are We? [J].
Halabi, Talal ;
Haque, Israat ;
Karimipour, Hadis .
2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, :239-247
[33]   Sliding Mode Control Based on Disturbance Observer for Cyber-Physical Systems Security [J].
Gao, Xiao .
2022 4TH INTERNATIONAL CONFERENCE ON CONTROL AND ROBOTICS, ICCR, 2022, :275-279
[34]   Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems [J].
Al-Mhiqani, Mohammed Nasser ;
Ahmad, Rabiah ;
Yassin, Warusia ;
Hassan, Aslinda ;
Abidin, Zaheera Zainal ;
Ali, Nabeel Salih ;
Abdulkareem, Karrar Hameed .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (01) :499-508
[35]   Security-Aware Design of Cyber-Physical Systems for Control over the Cloud [J].
Peng, Zebo .
2024 INTERNATIONAL SYMPOSIUM OF ELECTRONICS DESIGN AUTOMATION, ISEDA 2024, 2024, :786-786
[36]   Active Security Control Approach Against DoS Attacks in Cyber-Physical Systems [J].
Li, Tongxiang ;
Chen, Bo ;
Yu, Li ;
Zhang, Wen-An .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (09) :4303-4310
[37]   Security Control for Cyber-Physical Systems With Optimal Dynamic Stealthy Actuator Attacks [J].
Sun, Kangkang ;
Zhang, Xiaochun .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024,
[38]   A Security Analysis of Cyber-Physical Systems Architecture for Healthcare [J].
Seifert, Darren ;
Reza, Hassan .
COMPUTERS, 2016, 5 (04)
[39]   Intelligent Security Measures for Smart Cyber-Physical Systems [J].
Shafique, Muhammad ;
Khalid, Faiq ;
Rehman, Semeen .
2018 21ST EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2018), 2018, :280-287
[40]   Analysis of Security Threats and Vulnerability for Cyber-physical Systems [J].
Gao, Yang ;
Peng, Yong ;
Xie, Feng ;
Zhao, Wei ;
Wang, Dejin ;
Han, Xuefeng ;
Lug, Tianbo ;
Lie, Zhao .
2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, :50-55