Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach

05/08/2019
by   Zhongyuan Hau, et al.
1

A design-centric modeling approach was proposed to model the behavior of the physical process controlled by an Industrial Control System (ICS) and study the cascading effects of data-oriented attacks. A threat model was used as input to guide the construction of the model where control components which are within the adversary's intent and capabilities are extracted. The relevant control components are subsequently modeled together with their control dependencies and operational design specifications. The approach was demonstrated and validated on a water treatment testbed. Attacks were simulated on the testbed model where its resilience to attacks was evaluated using proposed metrics such as Impact Ratio and Time-to-Critical-State. From the analysis of the attacks, design strengths and weaknesses were identified and design improvements were recommended to increase the testbed's resilience to attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/24/2020

KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems

There are different requirements on cybersecurity of industrial control ...
research
11/26/2022

SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical

Modern Industrial Control Systems (ICS) attacks evade existing tools by ...
research
08/23/2023

Resiliency Analysis of LLM generated models for Industrial Automation

This paper proposes a study of the resilience and efficiency of automati...
research
11/04/2019

Design Considerations for Building Credible Security Testbeds: A Systematic Study of Industrial Control System Use Cases

This paper presents a mapping framework for design factors and implement...
research
03/29/2022

Systematically Evaluation of Challenge Obfuscated APUFs

As a well-known physical unclonable function that can provide huge numbe...
research
06/10/2020

Evaluating the Exploitability of Implicit Interactions in Distributed Systems

Implicit interactions refer to those interactions among the components o...
research
02/17/2021

Scanning the Cycle: Timing-based Authentication on PLCs

Programmable Logic Controllers (PLCs) are a core component of an Industr...

Please sign up or login with your details

Forgot password? Click here to reset