A framework to assess impacts of cyber attacks in manufacturing

被引:10
作者
Giehl, Alexander [1 ]
Wiedermann, Norbert [1 ]
Plaga, Sven [1 ]
机构
[1] Fraunhofer AISEC, Parkring 4, Garching, Germany
来源
PROCEEDINGS OF 2019 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2019) | 2019年
关键词
Security; Manufacturing; Risk Management; Industrie; 4.0; SECURITY;
D O I
10.1145/3313991.3314003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent trends in manufacturing and industry accelerate the interconnection of industrial control systems between each other and over public networks. This brings an increase of cyber attack impact with it as the number of potential targets rises and the consequences of the attacks gain in severity. In order to build secure manufacturing systems, it is paramount to measure the possible impact of cyber attacks. This is required to evaluate security controls towards their effectiveness in attack scenarios. In this work, a proposal for an impact assessment framework in manufacturing is given. A suitable attacker model for execution of the attacks is provided. An evaluation metric for quantifying attack impact on manufacturing systems is developed. A lightweight modeling technique is presented and used to study the impact of cyber attacks on a cellular assembly setup. Different attack scenarios are implemented and simulated within the framework. The simulations provide detailed insight and illustrate attack impact.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 28 条
[1]  
[Anonymous], ENT CONTR SYST INT 1
[2]  
[Anonymous], IFAC PAPERSONLINE
[3]  
[Anonymous], 2015, ZVEI
[4]  
[Anonymous], 2018, GNU OCTAVE HIGH LEVE
[5]  
[Anonymous], 2014, Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, DOI DOI 10.1016/C2013-0-06836-3
[6]  
Antón SD, 2017, 2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), P97
[7]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[8]  
Ball M. O., 1995, HDBK OPER R, P673, DOI DOI 10.1016/S0927-0507(05)80128-8
[9]  
Brunner M., 2010, Infiltrating critical infrastructures with next-generation attacks
[10]  
Christiansson H, 2008, INT FED INFO PROC, V253, P237