Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth

Published: 23 November 2022 Publication History

Abstract

Recent innovations in the smart city domain have led to the proposition of a new mode of transportation utilizing Autonomous Passenger Ships (APS) or ferries in inland waterways. The novelty of the APS concept influenced the cyber risk paradigm and led to different considerations regarding attack objectives, techniques as well as risk management approaches. The main factor that has led to this is the autoremote operational mode, which refers to autonomous operations and remote supervision and control in case of emergency. The autoremote operational mode influences the risk of cyber attacks due to the increased connectivity and reliance on technology for automating navigational functions. On the other hand, the presence of passengers without crew members imposes a safety risk factor in cyber attacks. In this paper, we propose a new cyber risk management approach for managing the cyber risks against cyber physical systems in general and Autonomous Passenger Ships in particular. Our proposed approach aims to improve the Defense-in-Depth risk management strategy with additional components from the Threat-Informed Defense strategy allowing for more evolved cyber risk management capabilities. Moreover, we have utilized the proposed cyber risk management approach for the proposition of a cybersecurity architecture for managing the cyber risks against an APS use case named milliAmpere2. Additionally, we present our results after conducting a Systematic Literature Review (SLR) in cybersecurity evaluation in the maritime domain. Then, the findings of the SLR were utilized for a suitable evaluation of the proposed risk management approach. Our findings suggest that our proposed risk management approach named Threat-Informed Defense-in-Depth is capable of enriching several risk management activities across different stages in the system development life cycle. Additionally, a comprehensive evaluation of the cybersecurity posture of milliAmpere2 has been conducted using several approaches including risk evaluation, simulation, checklist, and adversary emulation. Our evaluation has uncovered several limitations in the current cybersecurity posture and proposed actions for improvement.

References

[1]
Fruth Markus and Teuteberg Frank Digitization in maritime logistics-what is there and what is missing Cogent Bus. Manag. 2017 4 1 1411066
[2]
Sea passenger statistics 2020: Short sea routes. http://bit.ly/PassengerStatistics2020. Accessed 11 Oct 2021
[3]
Lam, Y.: Technology will help maritime transport navigate through the pandemic-and beyond. https://blogs.worldbank.org/transport/technology-will-help-maritime-transport-navigate-through-pandemic-and-beyond, November (2020). Accessed 05 Jan 2022
[4]
Transportation statistics annual report 2020. https://www.bts.gov/tsar, Dec (2020)
[7]
NTNU Autoferry. Autoferry - Autonomous all-electric passenger ferries for urban water transport. https://www.ntnu.edu/autoferry, (2018)
[8]
DNV GL. Dnvgl-cg-0264: Autonomous and remotely operated ships. (2018)
[9]
Amro, Ahmed, Gkioulos, Vasileios, Katsikas, Sokratis: Connect and protect: Requirements for maritime autonomous surface ship in urban passenger transportation. In: Computer Security, pp. 69–85. Springer, (2019)
[10]
Amro, A., Gkioulos, V., Katsikas, S.: Communication architecture for autonomous passenger ship. Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, p. 1748006X211002546, (2021)
[11]
Stouffer, K., Lightman, S., Pillitteri, V., Abrams, M., Hahn, A.: Nist special publication 800-82, revision 2: Guide to industrial control systems (ics) security. National Institute of Standards and Technology, (2014)
[12]
Fielder, A., Li, T., Hankin, C.: Defense-in-depth vs. critical component defense for industrial control systems. In: 4th International Symposium for ICS & SCADA Cyber Security Research 2016 4, pp. 1–10, (2016)
[13]
zvelo. Fight ransomware with defense in depth. https://zvelo.com/fight-ransomware-with-defense-in-depth/. Accessed 11 Oct 2021
[14]
MITRE. Threat-informed defense. https://www.mitre.org/news/focal-points/threat-informed-defense. Accessed 05.01.2022
[15]
The Maritime Safety Committee. International maritime organization (imo) (2017) guidelines on maritime cyber risk management. http://bit.ly/MSC428-98
[16]
The Maritime Safety Committee. Interim guidelines on maritime cyber risk management (msc-fal.1/circ.3/rev.1). https://cutt.ly/6R8wqjN
[17]
Barrett, M.P.: Framework for improving critical infrastructure cybersecurity. In: National Institute of Standards and Technology, Gaithersburg, MD, USA, Tech. Rep, (2018)
[18]
Boyens, J., Paulsen, C., Moorthy, R., Bartol, N., Shankles, S.: Nist special publication 800-161: Supply chain risk management practices for federal in-formation systems and organizations. In: NIST. April, (2015)
[19]
Savold, R., Dagher, N., Frazier, P., McCallam, D.: Architecting cyber defense: A survey of the leading cyber reference architectures and frameworks. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 127–138. IEEE, (2017)
[20]
Americas Headquarters. Cisco safe reference guide. (2009)
[21]
Chappelle, D.: Security in depth reference architecture release 3.0. In: White paper, Oracle Corporation, Redwood Shores, (2013)
[22]
McCallam, D.: An analysis of cyber reference architectures. In: Presented at NATO 2012 Workshop with Industry on Cybersecurity Capabilities, (2012)
[23]
Fabro, M., Gorski, E., Spiers, N., Diedrich, J., Kuipers, D.: Recommended practice: improving industrial control system cybersecurity with defense-in-depth strategies. DHS Industrial Control Systems Cyber Emergency Response Team, (2016)
[24]
DK Rasmus Nord Jorgensen in Copenhagen. Bimco: The guidelines on cyber security onboard ships. https://iumi.com/news/blog/bimco-the-guidelines-on-cyber-security-onboard-ships
[25]
Svilicic B, Kamahara J, Rooks M, and Yano Y Maritime cyber risk management: an experimental ship assessment J. Navig. 2019 72 5 1108-1120
[26]
Grigoriadis, C., Papastergiou, S., Kotzanikolaou, P., Douligeris, C., Dionysiou, A., Elias, A., Bernsmed, K., Meland, P., Kamm, L.: Integrating and validating maritime transport security services: Initial results from the cs4eu demonstrator. In: 2021 Thirteenth International Conference on Contemporary Computing (IC3-2021), pp. 371–377, (2021)
[27]
Kavallieratos G and Katsikas S Managing cyber security risks of the cyber-enabled ship J. Mar. Sci. Eng. 2020 8 10 768
[28]
ISO. Iso 31000:2018 risk management - guidelines, (2018)
[29]
Stouffer Keith, Falco Joe, Scarfone Karen, et al. Guide to industrial control systems (ics) security NIST Spec. Publ. 2011 800 82 16-16
[30]
Rajaram, P., Goh, M., Zhou, J.: Guidelines for cyber risk management in shipboard operational technology systems. arXiv preprint arXiv:2203.04072, (2022)
[31]
DNV. Ddnvgl-cg-0325: Cyber secure class notation. https://rules.dnvgl.com/docs/pdf/DNVGL/CG/2020-10/DNVGL-CG-0325.pdf, (2020)
[32]
Strom, B.E., Applebaum, A., Miller, D.P., Nickels, K.C., Pennington, A.G., Thomas, C.B.: Mitre att &ck: Design and philosophy. Tech. Rep. (2018)
[34]
[37]
Amro, A., Gkioulos, V., Katsikas, S.: Assessing cyber risk in cyber-physical systems using the attack framework. Submitted for review to ACM Transactions on Privacy and Security (TOPS), Association for Computing Machinery, New York, USA., (2022)
[38]
IEC 60812 Technical Committee et al. Analysis techniques for system reliability-procedure for failure mode and effects analysis (fmea). (2018)
[39]
Shostack, A.: Threat Modeling: Designing for Security, Wiley Publishing. 2014
[40]
Mihai I-C, Pruna S, and Barbu I-D Cyber kill chain analysis Int. J. Info. Sec. Cybercrime 2014 3 37
[41]
Houmb SH, Franqueira VNL, and Engum EA Quantifying security risk level from cvss estimates of frequency and impact J. Syst. Softw. 2010 83 9 1622-1634
[42]
Douglas, B.W. et al. Introduction to graph theory, vol. 2. Prentice hall Upper Saddle River, NJ, (1996)
[43]
Dnvgl-rp-0496 recommended practice: Cyber security resilience management for ships and mobile offshore units in operation. https://www.dnv.com/maritime/dnv-rp-0496-recommended-practice-cyber-security-download.html, (2021). Accessed on 16 Feb 2022
[44]
Drougkas, A., Sarri, A., Kyranoudi, P.: EU Agency for cybersecurity. Guidelines - cyber risk management for ports. https://www.enisa.europa.eu/publications/guidelines-cyber-risk-management-for-ports, 12 (2020)
[45]
IEC ISO. Ieee: Iso/iec/ieee 42010: 2011-systems and software engineering–architecture description. Proceedings of Technical Report, (2011)
[46]
Feiler, P.H., Gluch, D.P., Hudak, J.J.: The architecture analysis & design language (aadl): An introduction. Technical report, Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst, (2006)
[47]
SEI AADL Team et al. An extensible open source aadl tool environment (osate). In: Software Engineering Institute, 2006
[48]
de Saqui-Sannes, P., Hugues, J., et al.: Combining sysml and aadl for the design, validation and implementation of critical systems. In: ERTS 2012, (2012)
[49]
Kordon, F., Hugues, J., Canals, A., Dohet, A.: Embedded systems: analysis and Modeling with SysML, UML and AADL. John Wiley & Sons, (2013)
[50]
Okoli, C., Schabram, K.: A guide to conducting a systematic literature review of information systems research. (2010)
[51]
Mavroeidis, V., Bromander, S.: Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. In: 2017 European Intelligence and Security Informatics Conference (EISIC), pp. 91–98. IEEE, (2017)
[53]
Iec, I.S.O., ieee 15288,: Systems and software engineering-Content of systems and software life cycle process information products (Documentation), p. 2015. Geneva, Switzerland, International Organization for Standardization/International Electrotechnical Commission (2015)
[54]
Babineau, G.L., Jones, R.A., Horowitz, B.: A system-aware cyber security method for shipboard control systems with a method described to evaluate cyber security solutions. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 99–104. IEEE, (2012)
[55]
Enoch SY, Lee JS, and Kim DS Novel security models, metrics and security assessment for maritime vessel networks Comput. Netw. 2021 189
[56]
Havdal, G., Heggelund, C.T., Larssen, C.H.: Design of a small autonomous passenger ferry. Master’s thesis, NTNU, (2017)
[57]
Aps communication architecture aadl model. https://github.com/ahmed-amro/APS-Communication_Architecture.git. Accessed: 10 June 2022
[58]
CORE Ramboll. Advokatfirma: Analysis of regulatory barriers to the use of autonomous ships: Final report. Danish Maritime Authority, Copenhagen, pp. 1374–1403, (2017)
[59]
Veritas, B.: Ni641 guidelines for autonomous shipping. (2019)
[60]
Goudossis A and Katsikas SK Towards a secure automatic identification system (ais) J. Mar. Sci. Technol. 2019 24 2 410-423
[61]
Kessler, G.C.: Protected ais: a demonstration of capability scheme to provide authentication and message integrity. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 14(2), (2020)
[62]
Goudosis, A., Katsikas, S.K.: Secure ais with identity-based authentication and encryption. TransNav Int. J. Mar. Navig. Saf. Sea Transp. 14(2), (2020)
[63]
Aziz, A., Tedeschi, P., Sciancalepore, S., Di Pietro, R.: Secureais-securing pairwise vessels communications. In: 2020 IEEE Conference on Communications and Network Security (CNS), pp. 1–9. IEEE, (2020)
[64]
Iphar Clément, Ray Cyril, and Napoli Aldo Data integrity assessment for maritime anomaly detection Expert Syst. Appl. 2020 147
[65]
Blauwkamp, D., Nguyen, T.D., Xie, G.G.: Toward a deep learning approach to behavior-based ais traffic anomaly detection. In: Dynamic and Novel Advances in Machine Learning and Intelligent Cyber Security (DYNAMICS) Workshop, San Juan, PR. Retrieved from http://faculty.nps.edu/Xie/papers/ais_analysis_18.pdf, (2018)
[66]
Balduzzi, M., Pasta, A., Wilhoit, K.: A security evaluation of ais automated identification system. In: Proceedings of the 30th annual computer security applications conference, pp. 436–445, (2014)
[67]
Boudehenn, C., Jacq, O., Lannuzel, M., Cexus, J.-C., Boudraa, A.: Navigation anomaly detection: an added value for maritime cyber situational awareness. In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–4. IEEE, (2021)
[68]
Lee, D.-K., Miralles, D., Akos, D., Konovaltsev, A., Kurz, L., Lo, S., Nedelkov, F.: Detection of gnss spoofing using nmea messages. In: 2020 European Navigation Conference (ENC), pp. 1–10. IEEE, (2020)
[69]
Amro A Oruc, Aybars, Gkioulos, Vasileios, Katsikas, Sokratis: navigation data anomaly analysis and detection Information 2022 13 3 104
[70]
Joe, T., Eggert, L., Wang, Y.: Use of ipsec transport mode for dynamic routing. Request for Comments (RFC), 3884, 2004
[71]
Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, W., Zorn, G.: Point-to-point tunneling protocol (pptp), (1999)
[72]
Lee, R.M., Assante, M.J.: Analysis of the cyber attack on the ukraine power grid. In E-ISAC and SANS, White (2016)
[73]
Cherepanov, A.: Win32/industroyer: A new threat for industrial control systems, p. 2017. ESET (June, White paper (2017)
[74]
Loukas G, Karapistoli E, Panaousis E, Sarigiannidis P, Bezemskij A, and Vuong T A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles Ad Hoc Netw. 2019 84 124-147
[75]
Ross, R., Viscuso, P., Guissanie, G., Dempsey, K., Riddle, M.: Protecting controlled unclassified information in nonfederal information systems and organizations. Technical report, National Institute of Standards and Technology (2016)
[76]
Ab Rahman Nurul Hidayah and Choo Kim-Kwang Raymond A survey of information security incident handling in the cloud Comput. Secur. 2015 49 45-69
[77]
Elk stack: Elasticsearch, logstash, kibana. https://www.elastic.co/what-is/elk-stack. Accessed 11 Oct 2021
[78]
Kotenko, I., Kuleshov, A., Ushakov, I.: Aggregation of elastic stack instruments for collecting, storing and processing of security information and events. In 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), pp. 1–8. IEEE, (2017)
[79]
Nabil, M., Soukainat, S., Lakbabi, A., Ghizlane, O.: Siem selection criteria for an efficient contextual security. In: 2017 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE, (2017)
[80]
Kimberly, T., Kevin, J.: Factors affecting cyber risk in maritime. In: 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp. 1–8. IEEE, 2019
[81]
Abkowitz MD and Camp JS An application of enterprise risk management in the marine transportation industry WIT Trans. Built Environ. 2011 119 221-232
[82]
Kushal TRB, Lai K, and Illindala MS Risk-based mitigation of load curtailment cyber attack using intelligent agents in a shipboard power system IEEE Trans. Smart Grid 2018 10 5 4741-4750
[83]
Hemminghaus, C., Bauer, J., Padilla, E.: A bridge attack tool for cyber security assessments of maritime systems, Brat (2021)
[84]
Yi C-G and Kim Y-G Security testing for naval ship combat system software IEEE Access 2021 9 66839-66851
[85]
Le, H.V., Nguyen, T.N., Nguyen, H.N., Le, L.: An efficient hybrid webshell detection method for webserver of marine transportation systems. IEEE Trans. Intell. Transp. Syst., (2021)
[86]
Daniel T., Jonathon M., Alexander, F.L.S.: A framework for cybersecurity assessments of critical port infrastructure. In: 2017 International Conference on Cyber Conflict (CyCon US), pp. 1–7. IEEE, (2017)
[87]
Kuhn, K., Bicakci, S., Shaikh, S.A.: Covid-19 digitization in maritime: understanding cyber risks. WMU Journal of Maritime Affairs, pages 1–22, (2021)
[88]
McCready, J.W., Callahan, W., Mayhew, D., Heckman, M.: Toward a maritime cyber security compliance regime. In: SNAME Maritime Convention. OnePetro, (2018)
[89]
Schauer Stefan, Polemi Nineta, and Mouratidis Haralambos Mitigate: a dynamic supply chain cyber risk assessment methodology J. Transp. Secur. 2019 12 1 1-35
[90]
Jacq, O., Boudvin, X., Brosset, D., Kermarrec, Y., Simonin, J.: Detecting and hunting cyberthreats in a maritime environment: Specification and experimentation of a maritime cybersecurity operations centre. In 2018 2nd Cyber Security in Networking Conference (CSNet), pp. 1–8. IEEE, (2018)
[91]
Neumann, J.C.: The book of GNS3: build virtual network labs using Cisco, Juniper, and more. No Starch Press, (2015)
[93]
Systems and Software Engineering - System Life Cycle Processes. Geneva, Switzerland: International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC)/Institute of Electrical and Electronics Engineers. ISO/IEC 15288:2015
[94]
Gestionnaire libre de parc informatique (glpi). https://glpi-project.org/. Accessed 11 Oct 2021
[95]
Fusionlnventory - the opensource it inventory solution. https://fusioninventory.org/. Accessed 11 Oct 2021
[96]
Duo security - two factor authentication. https://duo.com/. Accessed 11 Oct 2021
[97]
Ajay, T.: Iperf: The tcp/udp bandwidth measurement tool. http://dast.nlanr.net/Projects/Iperf/, 1999
[98]
Rødseth, Ø.: Munin deliverable 4.3: Evaluation of ship to shore communication links. http://www.unmanned-ship.org/munin/wp-content/uploads/2014/02/d4-3-eval-ship-shore-v11.pdf, (2012)
[99]
Chu, H.: LDAP. Washington, D.C., Dec (2006). USENIX Association
[100]
Wengyik, Y., Tim, H., Steve, K.: Lightweight directory access protocol. 1995
[101]
Nathan, Y.: pgina administration and users documentation. http://pgina.org/. Accessed 11 Oct 2021
[102]
Clamav an open-source antivirus engine. https://www.clamav.net/. Accessed: 11 Oct 2021
[103]
Borgbackup, deduplicating archiver with compression and encryption. https://www.borgbackup.org/. Accessed: 11 Oct 2021
[104]
Roesch, M., et al.: Snort: lightweight intrusion detection for networks. In Lisa 99, 229–238 (1999)
[105]
Wazuh - the open source security platform. https://wazuh.com/. Accessed 11 Oct 2021
[106]
MITRE. Chimera, Group G0114, 2021 (accessed 11 May 2021). https://attack.mitre.org/groups/G0114/
[107]
Gordon, F.L.: Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure, Com LLC (US) (2008)
[108]
Cisco: RV0xx Series Routers, ADMINISTRATION GUIDE, (2021) (accessed 13 May 2021). http://bit.ly/RV042

Cited By

View all

Index Terms

  1. Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image International Journal of Information Security
            International Journal of Information Security  Volume 22, Issue 1
            Feb 2023
            295 pages
            ISSN:1615-5262
            EISSN:1615-5270
            Issue’s Table of Contents

            Publisher

            Springer-Verlag

            Berlin, Heidelberg

            Publication History

            Published: 23 November 2022

            Author Tags

            1. Autonomous Passenger Ship
            2. Cybersecurity architecture
            3. ATT&CK
            4. Defense-in-Depth
            5. Cyber risk Management

            Qualifiers

            • Research-article

            Funding Sources

            • NTNU Norwegian University of Science and Technology (incl St. Olavs Hospital - Trondheim University Hospital)

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 12 Jan 2025

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Charting new waters with CRAMMTSComputers and Security10.1016/j.cose.2024.104015145:COnline publication date: 1-Oct-2024
            • (2024)Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial networkInternational Journal of Information Security10.1007/s10207-024-00844-w23:3(2353-2376)Online publication date: 1-Jun-2024
            • (2024)Maritime cybersecurity: protecting digital seasInternational Journal of Information Security10.1007/s10207-023-00800-023:2(1429-1457)Online publication date: 1-Apr-2024
            • (2024)Guidelines for Cyber Risk Management in Autonomous ShippingApplied Cryptography and Network Security Workshops10.1007/978-3-031-61489-7_9(143-161)Online publication date: 5-Mar-2024

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media