Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Bio-immunology Inspired Industrial Control System Security Model

  • Conference paper
  • First Online:
First International Conference on Sustainable Technologies for Computational Intelligence

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1045))

  • 1554 Accesses

Abstract

Industrial Control System (ICS) security is inadequate to protect ICS from Advanced Persistent Threats (APT). APTs attack ICS in such a way that they are detected after a long time in the system. This paper proposes the use of the biological immune system as a foundation for developing ICS security architecture because the biological immune system is renowned for defending the body from pathogens. The paper compares how the Biological Immune System (BIS) defends the body from pathogens and how ICS are secured from invasion by any attack. By considering the similarities and differences between ICS security and the BIS operation and taking into consideration current research on ICS security a bio-immunology inspired security model to defend ICS was designed. The proposed model was designed using design science research and initial results are presented in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Piggin, R.S.H.: Emerging good practice for cyber security of industrial control systems and SCADA. In: 7th IET International Conference on System Safety, Incorporating the Cyber Security Conference 2012, pp. 1–6. IET (2012)

    Google Scholar 

  2. Bere, M.: A preliminary review of ICS security frameworks and standards versus advanced persistent threats. In: Iccws 2015—The Proceedings of the 10th International Conference on Cyber Warfare and Security: ICCWS2015 (2015)

    Google Scholar 

  3. Targeted cyberattacks logbook, https://apt.securelist.com/#!/threats/

  4. Bere, M., Muyingi, H.: Initial investigation of industrial control system (ICS) security using artificial immune system (AIS). In: 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), pp. 79–84 (2015)

    Google Scholar 

  5. Edgar, D.J.M.: Master Medicine: Immunology: A Core Text with Self-Assessment

    Google Scholar 

  6. Parham, P.: The Immune System. Garland Science, London (2009)

    Google Scholar 

  7. Abbas, A.K., Lichtman, A.H., Pillai, S., Baker, D.L., Baker, A.: Basic Immunology: Functions and Disorders of the Immune System. Elsevier, St. Louis, Missouri (2016)

    Google Scholar 

  8. Murphy, K.P., Travers, P., Walport, M., Ehrenstein, M., Janeway, C. (eds.): Janeway’s Immunobiology. Garland Science, New York, NY (2008)

    Google Scholar 

  9. Segel, L.A., Cohen, I.R. (eds.): Design Principles for the Immune System and Other Distributed Autonomous Systems. Oxford University Press, Oxford (2001)

    Google Scholar 

  10. Aickelin, U., Dasgupta, D., Gu, F.: Artificial immune systems. In: Search Methodologies, pp. 187–211. Springer (2014)

    Google Scholar 

  11. Mohamed Elsayed, S.A., Ammar, R.A., Rajasekaran, S.: Artificial immune systems: models, applications, and challenges. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing—SAC ’12, p. 256. ACM Press, Trento, Italy (2012)

    Google Scholar 

  12. Hart, E., Timmis, J.: Application Areas of AIS: The Past, The Present and The Future, 15

    Google Scholar 

  13. Zheng, J., Chen, Y., Zhang, W.: A survey of artificial immune applications. Artif. Intell. Rev. 34, 19–34 (2010)

    Article  Google Scholar 

  14. Andrews, P.S., Timmis, J.: Inspiration for the next generation of artificial immune systems. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) Artificial Immune Systems, pp. 126–138. Springer, Berlin Heidelberg (2005)

    Chapter  Google Scholar 

  15. Somayaji, A., Locasto, M., Feyereisl, J.: The future of biologically-inspired security: is there anything left to learn? 6

    Google Scholar 

  16. Knapp, E.D., Langill, J.T.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Elsevier, Syngress, Amsterdam (2015)

    Google Scholar 

  17. Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., Hahn, A.: Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology (2015)

    Google Scholar 

  18. WHO | Life expectancy, http://www.who.int/gho/mortality_burden_disease/life_tables/situation_trends_text/en/

  19. de Vries, J., Hoogstraaten, H., van den Berg, J., Daskapan, S.: Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data Analysis. Presented at the December (2012)

    Google Scholar 

  20. Averbuch, A., Siboni, G.: The classic cyber defense methods have failed-what comes next? Mil. Strateg. Aff. 5, 45–58 (2013)

    Google Scholar 

  21. Skopik, F., Friedberg, I., Fiedler, R.: Dealing with advanced persistent threats in smart grid ICT networks. In: Innovative Smart Grid Technologies Conference (ISGT), 2014 IEEE PES, pp. 1–5. IEEE (2014)

    Google Scholar 

  22. Virvilis, N., Gritzalis, D.: The Big Four—What We Did Wrong in Advanced Persistent Threat Detection? Presented at the September (2013)

    Google Scholar 

  23. Ussath, M., Jaeger, D., Feng Cheng, Meinel, C.: Advanced persistent threats: Behind the scenes. In: 2016 Annual Conference on Information Science and Systems (CISS), pp. 181–186. IEEE, Princeton, NJ, USA (2016)

    Google Scholar 

  24. Paradise, A., Shabtai, A., Puzis, R., Elyashar, A., Elovici, Y., Roshandel, M., Peylo, C.: Creation and management of social network honeypots for detecting targeted cyber attacks. IEEE Trans. Comput. Soc. Syst. 4, 65–79 (2017)

    Article  Google Scholar 

  25. Bere, M., Bhunu-Shava, F., Gamundani, A., Nhamu, I.: How advanced persistent threats exploit humans. Int. J. Comput. Sci. 12, 6 (2015)

    Google Scholar 

  26. Iwata, K., Nakamura, Y., Inamura, H., Takahashi, O.: An automatic training system against advanced persistent threat. In: 2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU), pp. 1–2. IEEE, Toyama (2017)

    Google Scholar 

  27. Nicho, M., Khan, S.N.: A decision matrix model to identify and evaluate APT vulnerabilities at the user plane. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1155–1160. IEEE, Opatija (2018)

    Google Scholar 

  28. Baize, E.: Developing secure products in the age of advanced persistent threats. IEEE Secur. Priv. Mag. 10, 88–92 (2012)

    Article  Google Scholar 

  29. Giura, P., Wang, W.: A Context-Based Detection Framework for Advanced Persistent Threats. Presented at the December (2012)

    Google Scholar 

  30. Wang, X., Zheng, K., Niu, X., Wu, B., Wu, C.: Detection of command and control in advanced persistent threat based on independent access. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE, Kuala Lumpur, Malaysia (2016)

    Google Scholar 

  31. Messaoud, B.I.D., Guennoun, K., Wahbi, M., Sadik, M.: Advanced persistent threat: new analysis driven by life cycle phases and their challenges. In: 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS), pp. 1–6. IEEE, Marrakesh, Morocco (2016)

    Google Scholar 

  32. Ghafir, I., Hammoudeh, M., Prenosil, V., Han, L., Hegarty, R., Rabie, K., Aparicio-Navarro, F.J.: Detection of advanced persistent threat using machine-learning correlation analysis. Future Gener. Comput. Syst. 89, 349–359 (2018)

    Article  Google Scholar 

  33. Marchetti, M., Pierazzi, F., Colajanni, M., Guido, A.: Analysis of high volumes of network traffic for advanced persistent threat detection. Comput. Netw. 109, 127–141 (2016)

    Article  Google Scholar 

  34. Lu, J., Chen, K., Zhuo, Z., Zhang, X.: A temporal correlation and traffic analysis approach for APT attacks detection. Cluster Comput. (2017)

    Google Scholar 

  35. Lerner, L.W., Farag, M.M., Patterson, C.D.: Run-time prediction and preemption of configuration attacks on embedded process controllers. In: Proceedings of the First International Conference on Security of Internet of Things, pp. 135–144. ACM (2012)

    Google Scholar 

  36. Lerner, L.W., Franklin, Z.R., Baumann, W.T., Patterson, C.D.: Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control Systems. Presented at the June (2014)

    Google Scholar 

  37. Franklin, Z.R., Patterson, C.D., Lerner, L.W., Prado, R.J.: Isolating trust in an industrial control system-on-chip architecture. In: 2014 7th International Symposium on Resilient Control Systems (ISRCS), pp. 1–6. IEEE (2014)

    Google Scholar 

  38. QNCIS, Q.N.C. for I.S.: national ics security standard v.3 (2014), http://www.scadahacker.com/library/Documents/Standards/QCERT%20-%20National%20ICS%20Security%20Standard%20v.3%20-%20March%202014.pdf

  39. QCERT—National ICS Security Standard v.3—March 2014.pdf

    Google Scholar 

  40. Bequette, B.W.: Process Dynamics: Modeling, Analysis, and Simulation. Prentice Hall PTR, Upper Saddle River (2002)

    Google Scholar 

  41. screenshot.jpg (520 × 324), https://www.mathworks.com/matlabcentral/mlc-downloads/downloads/submissions/13556/versions/1/screenshot.jpg

  42. Blevins, T.: PID advances in industrial control. Presented at the Conference of Advances in PID Control, Brescia (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mercy Chitauro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chitauro, M., Muyingi, H., John, S., Chitauro, S. (2020). A Bio-immunology Inspired Industrial Control System Security Model. In: Luhach, A., Kosa, J., Poonia, R., Gao, XZ., Singh, D. (eds) First International Conference on Sustainable Technologies for Computational Intelligence. Advances in Intelligent Systems and Computing, vol 1045. Springer, Singapore. https://doi.org/10.1007/978-981-15-0029-9_64

Download citation

Publish with us

Policies and ethics