Cybersecurity Modelling for SCADA Systems: A Case Study

被引:0
作者
Cheng, Benny N. [1 ]
机构
[1] Naval Surface Warfare Ctr, Corona Div, 1999 4th St, Norco, CA 92860 USA
来源
2022 68TH ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM (RAMS 2022) | 2022年
关键词
cybersecurity; MTTSF; SCADA systems; attack and countermeasure trees;
D O I
10.1109/RAMS51457.2022.9893946
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes a cybersecurity model for Supervisory Control and Data Acquisition system (SCADA) using techniques similar to those used in reliability systems modelling. Previously, cybersecurity events were considered a part of the reliability events of a cyber physical system [1] [2]. Our approach identifies and treats such events separately as unique class of events by itself. Our analyses shows that the hierarchical model described below has the potential for quantifying the cybersecurity posture of a SCADA system, which goes beyond the usual pass/fail metrics that are currently in use [3]. A range of Mean Time to Security Failure (MTTSF) values as shown in the sensitivity studies below can capture both peacetime and wartime cyber risk assessment of the system. While the Attack and Countermeasure Tree (ACT) constructed below could be taken as somewhat simplistic, more detailed security events can be readily introduced to the ACT tree to reflect a better depiction of a cyberattack. For example, the Common Processing Systems (CPS) systems themselves can be further resolved into constituent components that are vulnerable to cyberattacks. Separate models can also be developed for each of the individual failure events, i.e. confidentiality, integrity, and availability, instead of combining them into one failure event as done below. The methodology for computing the MTTSF metric can be extended to other similar cybersecurity metrics, such as those formulated by the Center for Internet Security (CIS) [3], e.g. mean time to restore to operational status, etc. Additional improvements to the model can be obtained with the incorporation of the repair and restore portion of the semi-Markov chain in Figure 3, which will likely require the use of more advance modeling packages.
引用
收藏
页数:4
相关论文
共 8 条
  • [1] Center for Internet Security, 2010, CIS SEC METR, V1.1.0
  • [2] A method for modeling and quantifying the security attributes of intrusion tolerant systems
    Madan, BB
    Goseva-Popstojanova, K
    Vaidyanathan, K
    Trivedi, KS
    [J]. PERFORMANCE EVALUATION, 2004, 56 (1-4) : 167 - 186
  • [3] Martinez J. M., 2016, VALUETOOLS 2016
  • [4] Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
    Mitchell, Robert
    Chen, Ing-Ray
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2013, 62 (01) : 199 - 210
  • [5] National Institute of Standards, 2018, NIST SPECIAL PUBLICA, V800
  • [6] Roy A., SECUR COMMUN NETW, V3, P1
  • [7] Roy A, 2012, I C DEPEND SYS NETWO
  • [8] Sahner R. A., 1998, PERFORMANCE RELIABIL, V2nd