Graph-Theoretic Approach for Manufacturing Cybersecurity Risk Modeling and Assessment

01/18/2023
by   Md Habibor Rahman, et al.
0

Identifying, analyzing, and evaluating cybersecurity risks are essential to assess the vulnerabilities of modern manufacturing infrastructures and to devise effective decision-making strategies to secure critical manufacturing against potential cyberattacks. In response, this work proposes a graph-theoretic approach for risk modeling and assessment to address the lack of quantitative cybersecurity risk assessment frameworks for smart manufacturing systems. In doing so, first, threat attributes are represented using an attack graphical model derived from manufacturing cyberattack taxonomies. Attack taxonomies offer consistent structures to categorize threat attributes, and the graphical approach helps model their interdependence. Second, the graphs are analyzed to explore how threat events can propagate through the manufacturing value chain and identify the manufacturing assets that threat actors can access and compromise during a threat event. Third, the proposed method identifies the attack path that maximizes the likelihood of success and minimizes the attack detection probability, and then computes the associated cybersecurity risk. Finally, the proposed risk modeling and assessment framework is demonstrated via an interconnected smart manufacturing system illustrative example. Using the proposed approach, practitioners can identify critical connections and manufacturing assets requiring prioritized security controls and develop and deploy appropriate defense measures accordingly.

READ FULL TEXT
research
01/18/2023

Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures

A thorough and systematic understanding of different elements of cyberat...
research
05/06/2023

Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems

Additive manufacturing (AM) offers numerous benefits, such as manufactur...
research
10/14/2021

Assessing Risks and Modeling Threats in the Internet of Things

Threat modeling and risk assessments are common ways to identify, estima...
research
04/19/2021

FLAW3D: A Trojan-based Cyber Attack on the Physical Outcomes of Additive Manufacturing

Additive Manufacturing (AM) systems such as 3D printers use inexpensive ...
research
06/26/2019

Heuristic Approach Towards Countermeasure Selection using Attack Graphs

Selecting the optimal set of countermeasures is a challenging task that ...
research
07/26/2023

Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment

Risk assessment plays a crucial role in ensuring the security and resili...
research
12/29/2022

Identification and Verification of Attack-Tree Threat Models in Connected Vehicles

As a result of the ever-increasing application of cyber-physical compone...

Please sign up or login with your details

Forgot password? Click here to reset