Skip to main content

2022 | OriginalPaper | Buchkapitel

Industrial Control System Cybersecurity Assessment Handling Delay Estimation

verfasst von : A. A. Baybulatov, V. G. Promyslov

Erschienen in: Advances in Automation III

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, industrial control systems are becoming more digital, more complex, and more interconnected causing growing anxiety about their safety, security, and especially cybersecurity. For dealing with all security problems including cybersecurity assessment, security programs are utilized where the properties of confidentiality and integrity are characterized in detail. But the availability attribute often suffers due to a lack of attention, which makes the assessment of availability grow into one of the thorniest issues. The article investigates cybersecurity in the industrial control systems context, clarifies the great value of availability, and explains a reasonable shift between cybersecurity and availability assessment problems. A delay of the signal transmission is discovered to be a suitable measure of the quantitative availability assessment, and a theory of deterministic queuing systems Network calculus is advocated to be a relevant tool for the delay estimation and availability modelling. A reference model for the availability assessment and also an appropriate metric based on delay and system dependency are proposed. The results of the verification of the applicability of Network calculus to solving the delay estimation and cybersecurity assessment problems are presented.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber security. J. Digit. Forensics Secur. Law 12(2), 53–74 (2017) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber security. J. Digit. Forensics Secur. Law 12(2), 53–74 (2017)
2.
Zurück zum Zitat Denning, P.J., Denning, D.E.: Cybersecurity is harder than building bridges. Am. Sci. 104,154–157 (2016) Denning, P.J., Denning, D.E.: Cybersecurity is harder than building bridges. Am. Sci. 104,154–157 (2016)
4.
Zurück zum Zitat Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: IECON 2011–37th Annual Conference of the IEEE Industrial Electronics Society, pp. 4490–4494 (2011) Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: IECON 2011–37th Annual Conference of the IEEE Industrial Electronics Society, pp. 4490–4494 (2011)
5.
Zurück zum Zitat Marszal, E.M., McGlone, J.: Security PHA Review for Consequence-Based Cybersecurity. NC 27709, ISA, USA (2019) Marszal, E.M., McGlone, J.: Security PHA Review for Consequence-Based Cybersecurity. NC 27709, ISA, USA (2019)
6.
Zurück zum Zitat Stevens, T.: Global cybersecurity: new directions in theory and methods. Polit. Govern. 6(2), 1–4 (2018)CrossRef Stevens, T.: Global cybersecurity: new directions in theory and methods. Polit. Govern. 6(2), 1–4 (2018)CrossRef
7.
Zurück zum Zitat Ginter, A.: Secure Operations Technology. Abterra Technologies Inc., Calgary (2018) Ginter, A.: Secure Operations Technology. Abterra Technologies Inc., Calgary (2018)
8.
Zurück zum Zitat Ghosh, S., Sampalli, S.A.: Survey of security in SCADA networks: current issues and future challenges. IEEE Access 7, 135812–135831 (2019) Ghosh, S., Sampalli, S.A.: Survey of security in SCADA networks: current issues and future challenges. IEEE Access 7, 135812–135831 (2019)
9.
Zurück zum Zitat Anderson, A.: Built to Survive: A Business Owner's Guide on how to Survive a Cyber Attack. CreateSpace Independent Publishing Platform, Scotts Valley (2018) Anderson, A.: Built to Survive: A Business Owner's Guide on how to Survive a Cyber Attack. CreateSpace Independent Publishing Platform, Scotts Valley (2018)
10.
Zurück zum Zitat Qadir, S., Quadri, S.M.K.: Information availability: an Insight into the most important attribute of information security. J. Inf. Secur. 7, 185–194 (2016) Qadir, S., Quadri, S.M.K.: Information availability: an Insight into the most important attribute of information security. J. Inf. Secur. 7, 185–194 (2016)
11.
Zurück zum Zitat Black, P.E., Scarfone, K., Souppaya, M.: Cyber Security Metrics and Measures. Wiley Handbook of Science and Technology for Homeland Security, pp. 1–8. John Wiley & Sons, New York (2008) Black, P.E., Scarfone, K., Souppaya, M.: Cyber Security Metrics and Measures. Wiley Handbook of Science and Technology for Homeland Security, pp. 1–8. John Wiley & Sons, New York (2008)
12.
Zurück zum Zitat Andress, J.: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress, Oxford (2014) Andress, J.: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress, Oxford (2014)
13.
Zurück zum Zitat IEC 62443-1-1: Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models. IEC, Geneva (2009) IEC 62443-1-1: Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models. IEC, Geneva (2009)
14.
Zurück zum Zitat Bishop, M.: Computer Security: Art and Science. Addison-Wesley Professional, Boston (2003) Bishop, M.: Computer Security: Art and Science. Addison-Wesley Professional, Boston (2003)
15.
Zurück zum Zitat Denning, D.E.: The Limits of Formal Security Models. National Computer Systems Security Award Acceptance Speech (1999) Denning, D.E.: The Limits of Formal Security Models. National Computer Systems Security Award Acceptance Speech (1999)
16.
17.
Zurück zum Zitat IEC 62443-3-3: Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels. IEC, Geneva (2013) IEC 62443-3-3: Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels. IEC, Geneva (2013)
19.
Zurück zum Zitat Gunter, D.G., Medoff, M.D., O'Brien, P.C.: Implementing IEC 62443 - A Pragmatic Approach to Cybersecurity. Sellersville, PA, 18960, exida.com LLC (2018) Gunter, D.G., Medoff, M.D., O'Brien, P.C.: Implementing IEC 62443 - A Pragmatic Approach to Cybersecurity. Sellersville, PA, 18960, exida.com LLC (2018)
20.
Zurück zum Zitat Promyslov, V.G., Masolkin, S.I.: NPP APCS diagnostics implementation as a routine task of APCS. IFAC Proc. Vol. 42(2), 221–225 (2009)CrossRef Promyslov, V.G., Masolkin, S.I.: NPP APCS diagnostics implementation as a routine task of APCS. IFAC Proc. Vol. 42(2), 221–225 (2009)CrossRef
21.
Zurück zum Zitat Promyslov, V., Semenkov, K.: Non-statistical method for validation the time characteristics of digital control systems with a cyclic processing algorithm. submitted to review in Mathematics. Special Issue “Distributed Computer and Communication Networks” Promyslov, V., Semenkov, K.: Non-statistical method for validation the time characteristics of digital control systems with a cyclic processing algorithm. submitted to review in Mathematics. Special Issue “Distributed Computer and Communication Networks”
22.
Zurück zum Zitat Baybulatov, A.A.: Towards network calculus. A review of theories for dealing with facilities of increased danger. In: Proceedings of the 2018 11th International Conference “Management of large-scale system development” (MLSD 2018), pp. 1–5 (2018). https://ieeexplore.ieee.org/document/8551896 Baybulatov, A.A.: Towards network calculus. A review of theories for dealing with facilities of increased danger. In: Proceedings of the 2018 11th International Conference “Management of large-scale system development” (MLSD 2018), pp. 1–5 (2018). https://​ieeexplore.​ieee.​org/​document/​8551896
23.
Zurück zum Zitat Bouillard, A., Boyer, M., Le Corronc, E.: Deterministic Network Calculus: From Theory to Practical Implementation. Wiley-ISTE, London (2018)CrossRef Bouillard, A., Boyer, M., Le Corronc, E.: Deterministic Network Calculus: From Theory to Practical Implementation. Wiley-ISTE, London (2018)CrossRef
24.
Zurück zum Zitat Litvinov, G.L.: Dequantization of mathematical structures and tropical/idempotent mathematics. An introductory lecture. In: Litvinov, G.L., Maslov, V.P., Kushner, A.G., Sergeev, S.N. (eds.) Tropical and Idempotent Mathematics, pp. 5–21, Moscow (2012) Litvinov, G.L.: Dequantization of mathematical structures and tropical/idempotent mathematics. An introductory lecture. In: Litvinov, G.L., Maslov, V.P., Kushner, A.G., Sergeev, S.N. (eds.) Tropical and Idempotent Mathematics, pp. 5–21, Moscow (2012)
25.
Zurück zum Zitat Baybulatov, A.A., Promyslov, V.G.: Cybersecurity assessment using delay from backlog bound calculation. In: Proceedings of the 14th IEEE International Conference on Application of Information and Communication Technologies (AICT2020) (2020). http://ieeexplore.ieee.org/document/9368731 Baybulatov, A.A., Promyslov, V.G.: Cybersecurity assessment using delay from backlog bound calculation. In: Proceedings of the 14th IEEE International Conference on Application of Information and Communication Technologies (AICT2020) (2020). http://​ieeexplore.​ieee.​org/​document/​9368731
26.
Zurück zum Zitat Avizienis, A., Laprie, J., Randell, B.: Fundamental concepts of dependability. In: Proceedings of the 3rd IEEE Information Survivability Workshop (ISW-2000), pp. 7–12 (2000) Avizienis, A., Laprie, J., Randell, B.: Fundamental concepts of dependability. In: Proceedings of the 3rd IEEE Information Survivability Workshop (ISW-2000), pp. 7–12 (2000)
27.
Zurück zum Zitat Qadir, S.M., Quadri, S.M.K.: Metric for evaluating availability of an information system: a quantitative approach based on component dependency. Int. J. Netw. Secur. Appl. (IJNSA) 9(2), 1–11 (2017) Qadir, S.M., Quadri, S.M.K.: Metric for evaluating availability of an information system: a quantitative approach based on component dependency. Int. J. Netw. Secur. Appl. (IJNSA) 9(2), 1–11 (2017)
Metadaten
Titel
Industrial Control System Cybersecurity Assessment Handling Delay Estimation
verfasst von
A. A. Baybulatov
V. G. Promyslov
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-94202-1_43