Abstract

Industrial Control Systems (ICS) are used for monitoring and controlling critical infrastructures such as power stations, waste water treatment facilities, traffic lights, and many more. Lately, these systems have become a popular target for cyber attacks. Both during their design and while operational, security is often an afterthought, leaving them vulnerable to all sorts of attacks. This paper presents a formal approach for analysing the security of Industrial Control Systems. A knowledge-based system, namely IDP, is used to analyse a model of the control system and extract system vulnerabilities. In this paper we present the input model of the methodology and the inferences and queries that allow the system to extract vulnerabilities. This methodology has been added to an existing framework where the user can model his system in the modeling language SysML. This SysML model then gets parsed into suitable IDP input. A fully working prototype has been developed and the approach has been validated on a real case study.

Highlights

  • Industrial control systems used to be isolated, proprietary systems

  • At the top layer we model the process specification, which consists of the process parameters and operations

  • If there are component vulnerabilities that allow an attacker to take down a module by performing a Denial of Service (DoS) attack, it is possible that the module can not be used, and the user can not reach the parameter through the module

Read more

Summary

INTRODUCTION

Industrial control systems used to be isolated, proprietary systems. The only security concern was physical access to the system. Patch management is often an important aspect of maintaining ICS Due to their critical nature, attacks on these systems could have disastrous consequences. Industrial control system security has been a popular research topic since. This work presents a tool that performs a security analysis of an ICS model based on these standards and guidelines. This paper presents a model-based approach for the security analysis of industrial control systems. A prototype of the tool has been created and has been validated on a real case study This logic has been added to a framework which allows the user to model the system with SysML, the Systems Modelling Language.

RELATED WORK
AN INDUSTRIAL HATCHERY
APPROACH
The ICS Model
The User Model
The Policy Specification
The Vulnerability Model
FINDING VULNERABILITIES IN THE ICS
EVALUATION
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.