Skip to main content
Top

2018 | OriginalPaper | Chapter

Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation

Authors : Ron Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

Published in: Computer Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Industrial control systems (ICSs), and particularly supervisory control and data acquisition (SCADA) systems, are used in many critical infrastructures and are inherently insecure, making them desirable targets for attackers. ICS networks differ from typical enterprise networks in their characteristics and goals; therefore, security assessment methods that are common in enterprise networks (e.g., penetration testing) cannot be directly applied in ICSs. Thus, security experts recommend using an isolated environment that mimics the real one for assessing the security of ICSs. While the use of such environments solves the main challenge in ICS security analysis, it poses another one: the trade-off between budget and fidelity. In this paper we suggest a method for creating a digital twin that is network-specific, cost-efficient, highly reliable, and security test-oriented. The proposed method consists of two modules: a problem builder that takes facts about the system under test and converts them into a rules set that reflects the system’s topology and digital twin implementation constraints; and a solver that takes these inputs and uses 0–1 non-linear programming to find an optimal solution (i.e., a digital twin specification), which satisfies all of the constraints. We demonstrate the application of our method on a simple use case of a simplified ICS network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Cyber security assessment of industrial control systems - a good practice guide. Technical report, Centre for the Protection of National Infrastructure, April 2011 Cyber security assessment of industrial control systems - a good practice guide. Technical report, Centre for the Protection of National Infrastructure, April 2011
2.
go back to reference Alves, T., Das, R., Morris, T.: Virtualization of industrial control system testbeds for cybersecurity, pp. 10–14. ACM Alves, T., Das, R., Morris, T.: Virtualization of industrial control system testbeds for cybersecurity, pp. 10–14. ACM
3.
go back to reference Gao, H., Peng, Y., Dai, Z., Wang, T., Jia, K.: The design of ICS testbed based on emulation, physical, and simulation (EPS-ICS testbed). In: 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 420–423. IEEE (2013) Gao, H., Peng, Y., Dai, Z., Wang, T., Jia, K.: The design of ICS testbed based on emulation, physical, and simulation (EPS-ICS testbed). In: 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 420–423. IEEE (2013)
4.
go back to reference Genge, B., Siaterlis, C., Fovino, I.N., Masera, M.: A cyber-physical experimentation environment for the security analysis of networked industrial control systems. Comput. Electr. Eng. 38(5), 1146–1161 (2012)CrossRef Genge, B., Siaterlis, C., Fovino, I.N., Masera, M.: A cyber-physical experimentation environment for the security analysis of networked industrial control systems. Comput. Electr. Eng. 38(5), 1146–1161 (2012)CrossRef
5.
go back to reference Green, B., Lee, A., Antrobus, R., Roedig, U., Hutchison, D., Rashid, A.: Pains, gains and PLCs: ten lessons from building an industrial control systems testbed for security research. In: 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2017). USENIX Association, Vancouver (2017) Green, B., Lee, A., Antrobus, R., Roedig, U., Hutchison, D., Rashid, A.: Pains, gains and PLCs: ten lessons from building an industrial control systems testbed for security research. In: 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2017). USENIX Association, Vancouver (2017)
7.
go back to reference Holm, H., Karresand, M., Vidström, A., Westring, E.: A Survey of Industrial Control System Testbeds. Springer, Cham (2015)CrossRef Holm, H., Karresand, M., Vidström, A., Westring, E.: A Survey of Industrial Control System Testbeds. Springer, Cham (2015)CrossRef
8.
go back to reference Lemay, A., Fernandez, J., Knight, S.: An isolated virtual cluster for SCADA network security research. In: Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research, p. 88 (2013) Lemay, A., Fernandez, J., Knight, S.: An isolated virtual cluster for SCADA network security research. In: Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research, p. 88 (2013)
9.
go back to reference Leszczyna, R., Egozcue, E., Tarrafeta, L., Villar, V.F., Estremera, R., Alonso, J.: Protecting industrial control systems-recommendations for Europe and member states. Technical report (2011) Leszczyna, R., Egozcue, E., Tarrafeta, L., Villar, V.F., Estremera, R., Alonso, J.: Protecting industrial control systems-recommendations for Europe and member states. Technical report (2011)
10.
go back to reference Li, D., Sun, X.: Nonlinear Integer Programming, vol. 84. Springer, Cham (2006)MATH Li, D., Sun, X.: Nonlinear Integer Programming, vol. 84. Springer, Cham (2006)MATH
11.
go back to reference McLaughlin, S., Konstantinou, C., Wang, X., Davi, L., Sadeghi, A.-R., Maniatakos, M., Karri, R.: The cybersecurity landscape in industrial control systems. Proc. IEEE 104(5), 1039–1057 (2016)CrossRef McLaughlin, S., Konstantinou, C., Wang, X., Davi, L., Sadeghi, A.-R., Maniatakos, M., Karri, R.: The cybersecurity landscape in industrial control systems. Proc. IEEE 104(5), 1039–1057 (2016)CrossRef
12.
go back to reference Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)CrossRef Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)CrossRef
13.
go back to reference Murray, W., Ng, K.-M.: An algorithm for nonlinear optimization problems with binary variables. Comput. Optim. Appl. 47(2), 257–288 (2010)MathSciNetCrossRef Murray, W., Ng, K.-M.: An algorithm for nonlinear optimization problems with binary variables. Comput. Optim. Appl. 47(2), 257–288 (2010)MathSciNetCrossRef
14.
go back to reference Nazir, S., Patel, S., Patel, D.: Assessing and augmenting SCADA cyber security: a survey of techniques. Comput. Secur. 70, 436–454 (2017)CrossRef Nazir, S., Patel, S., Patel, D.: Assessing and augmenting SCADA cyber security: a survey of techniques. Comput. Secur. 70, 436–454 (2017)CrossRef
15.
go back to reference Qassim, Q., et al.: A survey of SCADA testbed implementation approaches. Indian J. Sci. Technol. 10, 26 (2017)CrossRef Qassim, Q., et al.: A survey of SCADA testbed implementation approaches. Indian J. Sci. Technol. 10, 26 (2017)CrossRef
16.
go back to reference Searle, J.: NESCOR guide to penetration testing for electric utilities. Technical report, National Electric Sector Cybersecurity Organization Resource (NESCOR) Searle, J.: NESCOR guide to penetration testing for electric utilities. Technical report, National Electric Sector Cybersecurity Organization Resource (NESCOR)
17.
go back to reference Siaterlis, C., Genge, B.: Cyber-physical testbeds. Commun. ACM 57(6), 64–73 (2014)CrossRef Siaterlis, C., Genge, B.: Cyber-physical testbeds. Commun. ACM 57(6), 64–73 (2014)CrossRef
18.
go back to reference Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST Spec. Publ. 800(82), 16 (2011) Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST Spec. Publ. 800(82), 16 (2011)
Metadata
Title
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation
Authors
Ron Bitton
Tomer Gluck
Orly Stan
Masaki Inokuchi
Yoshinobu Ohta
Yoshiyuki Yamada
Tomohiko Yagyu
Yuval Elovici
Asaf Shabtai
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-99073-6_26

Premium Partner