Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3384941.3409587acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach

Published: 06 October 2020 Publication History

Abstract

A design-centric modeling approach was proposed to model the behaviour of the physical processes controlled by Industrial Control Systems (ICS) and study the cascading impact of data-oriented attacks. A threat model was used as input to guide the construction of the CPS model where control components which are within the adversary's intent and capabilities are extracted. The relevant control components are subsequently modeled together with their control dependencies and operational design specifications. The approach was demonstrated and validated on a water treatment testbed. Attacks were simulated on the testbed model where its resilience to attacks was evaluated using proposed metrics such as Impact Ratio and Time-to-Critical-State. From the analysis of the attacks, design strengths and weaknesses were identified and design improvements were recommended to increase the testbed's resilience to attacks.

References

[1]
Sridhar Adepu and Aditya Mathur. 2016. An investigation into the response of a water treatment system to cyber attacks. In 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE). IEEE, 141--148.
[2]
Chuadhry Mujeeb Ahmed, Carlos Murguia, and Justin Ruths. 2017. Model-based Attack Detection Scheme for Smart Water Distribution Networks. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '17). ACM, New York, NY, USA, 101--113. https://doi.org/10.1145/3052973.3053011
[3]
Chuadhry Mujeeb Ahmed, Jianying Zhou, and Aditya P Mathur. 2018. Noise matters: Using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in cps. In Proceedings of the 34th Annual Computer Security Applications Conference. 566--581.
[4]
Alvaro A Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, and Shankar Sastry. 2011. Attacks against process control systems: risk assessment, detection, and response. In Proceedings of the 6th ACM symposium on information, computer and communications security. ACM, 355--366.
[5]
John H. Castellanos, Mart'in Ochoa, and Jianying Zhou. 2018. Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC '18). Association for Computing Machinery, New York, NY, USA, 582--594. https://doi.org/10.1145/3274694.3274745
[6]
John Henry Castellanos and Jianying Zhou. 2019. A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS. In International Conference on Applied Cryptography and Network Security. Springer.
[7]
Jay Wright Forrester. 1997. Industrial dynamics. Journal of the Operational Research Society, Vol. 48, 10 (1997), 1037--1041.
[8]
Béla Genge, István Kiss, and Piroska Haller. 2015. A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. International Journal of Critical Infrastructure Protection, Vol. 10 (2015), 3--17.
[9]
Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell. 2018. A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys (CSUR), Vol. 51, 4 (2018), 76.
[10]
Zhongyuan Hau and Emil C Lupu. 2019. Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks. In Proceedings of the 5th on Cyber-Physical System Security Workshop. 1--12.
[11]
Alexander Kott and Igor Linkov. 2019. Cyber resilience of systems and networks .Springer.
[12]
Marina Krotofil and Alvaro A Cárdenas. 2013. Resilience of process control systems to cyber-physical attacks. In Nordic Conference on Secure IT Systems. Springer, 166--182.
[13]
Marina Krotofil and Jason Larsen. 2014. Are you threatening my hazards?. In International Workshop on Security. Springer, 17--32.
[14]
Marina Krotofil, Jason Larsen, and Dieter Gollmann. 2015. The process matters: Ensuring data veracity in cyber-physical systems. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. ACM, 133--144.
[15]
A. P. Mathur and N. O. Tippenhauer. 2016. SWaT: a water treatment testbed for research and training on ICS security. In 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater). 31--36. https://doi.org/10.1109/CySWater.2016.7469060
[16]
Jezdimir Milovs ević, David Umsonst, Henrik Sandberg, and Karl Henrik Johansson. 2018. Quantifying the impact of cyber-attack strategies for control systems equipped with an anomaly detector. In 2018 European Control Conference (ECC). IEEE, 331--337.
[17]
Hamed Orojloo and Mohammad Abdollahi Azgomi. 2017. A method for evaluating the consequence propagation of security attacks in cyber--physical systems. Future Generation Computer Systems, Vol. 67 (2017), 57--71.
[18]
Thomas D O'Rourke. 2007. Critical infrastructure, interdependencies, and resilience. BRIDGE-Washington-National Academy of Engineering-, Vol. 37, 1 (2007), 22.
[19]
Min Ouyang and Leonardo Duenas-Osorio. 2014. Multi-dimensional hurricane resilience assessment of electric power systems. Structural Safety, Vol. 48 (2014), 15--24.
[20]
Dorothy A Reed, Kailash C Kapur, and Richard D Christie. 2009. Methodology for assessing the resilience of networked infrastructure. IEEE Systems Journal, Vol. 3, 2 (2009), 174--180.
[21]
John D Sterman. 2001. System dynamics modeling: tools for learning in a complex world. California management review, Vol. 43, 4 (2001), 8--25.
[22]
Keith Stouffer, Joe Falco, and Karen Scarfone. 2011. Guide to industrial control systems (ICS) security. NIST special publication, Vol. 800, 82 (2011), 16--16.

Cited By

View all
  • (2024)A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive SystemsACM Transactions on Autonomous and Adaptive Systems10.1145/365294919:2(1-49)Online publication date: 20-Apr-2024
  • (2024)Safety Analysis for Cyber-Physical Systems Under Cyber Attacks Using Digital Twin2024 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR61664.2024.10679484(1-8)Online publication date: 2-Sep-2024
  • (2023)Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos EngineeringIEEE Access10.1109/ACCESS.2023.331602811(106172-106189)Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CPSS '20: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop
October 2020
72 pages
ISBN:9781450376082
DOI:10.1145/3384941
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 October 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cascading impact of attacks
  2. cyber-physical systems security
  3. dynamical systems modeling
  4. resilience engineering
  5. security evaluation

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 43 of 135 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)26
  • Downloads (Last 6 weeks)5
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive SystemsACM Transactions on Autonomous and Adaptive Systems10.1145/365294919:2(1-49)Online publication date: 20-Apr-2024
  • (2024)Safety Analysis for Cyber-Physical Systems Under Cyber Attacks Using Digital Twin2024 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR61664.2024.10679484(1-8)Online publication date: 2-Sep-2024
  • (2023)Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos EngineeringIEEE Access10.1109/ACCESS.2023.331602811(106172-106189)Online publication date: 2023
  • (2023)Cyber resilience in industrial networks: A state of the art, challenges, and future directionsJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10178135:9(101781)Online publication date: Oct-2023
  • (2021)Cascading effects of cyber-attacks on interconnected critical infrastructureCybersecurity10.1186/s42400-021-00071-z4:1Online publication date: 1-Mar-2021
  • (2020)Hazard Driven Threat Modelling for Cyber Physical SystemsProceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy10.1145/3411498.3419967(13-24)Online publication date: 9-Nov-2020

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media