Skip to main content

2018 | OriginalPaper | Buchkapitel

Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes

verfasst von : Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon Foley, Youssef Laarouchi

Erschienen in: Data and Applications Security and Privacy XXXII

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Diagnosing accidental and malicious events in an industrial control system requires an event model with specific capacities. Most models are dedicated to either safety or security but rarely both. And the latter are developed for objectives other than diagnosis and therefore unfit for this task. In this paper, we propose an event model considering both safety and security events, usable in real-time, with a probabilistic measure of on-going and future events. This model is able to replace alerts in the context of more global scenarios, including with reinforcements or conflicts between safety and security. The model is then used to provide an analysis of some of the security and safety events in the Taum Sauk Hydroelectric Power Station.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
C is not a LAMBDA event. It is just an abstraction used to compute the PDF associated to a set of events. It has no meaning outside of the scope of the probabilistic calculations.
 
Literatur
1.
Zurück zum Zitat Vesely, W.E., Goldberg, F.F., Roberts, N.H., Haasl, D.F.: Fault tree handbook. Report, DTIC Document (1981) Vesely, W.E., Goldberg, F.F., Roberts, N.H., Haasl, D.F.: Fault tree handbook. Report, DTIC Document (1981)
3.
Zurück zum Zitat Frigault, M., Wang, L., Singhal, A., Jajodia, S.: Measuring network security using dynamic Bayesian network. In: Proceedings of the 4th ACM Workshop on Quality of Protection, 1456368, pp. 23–30. ACM (2008) Frigault, M., Wang, L., Singhal, A., Jajodia, S.: Measuring network security using dynamic Bayesian network. In: Proceedings of the 4th ACM Workshop on Quality of Protection, 1456368, pp. 23–30. ACM (2008)
4.
Zurück zum Zitat Kumar, S., Spafford, E.: A pattern matching model for misuse intrusion detection (1994) Kumar, S., Spafford, E.: A pattern matching model for misuse intrusion detection (1994)
5.
Zurück zum Zitat Bouissou, M., Bon, J.L.: A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes. Mater. Reliab. Eng. Syst. Saf. 82(2), 149–163 (2003)CrossRef Bouissou, M., Bon, J.L.: A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes. Mater. Reliab. Eng. Syst. Saf. 82(2), 149–163 (2003)CrossRef
6.
Zurück zum Zitat Piètre-Cambacédès, L., Bouissou, M.: Beyond attack trees: dynamic security modeling with Boolean logic driven Markov processes (BDMP). In: Proceedings of the 2010 European Dependable Computing Conference, vol. 1827752, pp. 199–208. IEEE Computer Society (2010) Piètre-Cambacédès, L., Bouissou, M.: Beyond attack trees: dynamic security modeling with Boolean logic driven Markov processes (BDMP). In: Proceedings of the 2010 European Dependable Computing Conference, vol. 1827752, pp. 199–208. IEEE Computer Society (2010)
7.
Zurück zum Zitat Bouissou, M., Villatte, N., Bouhadana, H., Bannelier, M.: Knowledge modelling and reliability processing: presentation of the figaro language and associated tools. Report, Electricite de France (EDF), December 1991CrossRef Bouissou, M., Villatte, N., Bouhadana, H., Bannelier, M.: Knowledge modelling and reliability processing: presentation of the figaro language and associated tools. Report, Electricite de France (EDF), December 1991CrossRef
8.
Zurück zum Zitat Pernestl, A.: A Bayesian approach to fault isolation with application to diesel engine diagnosis. Thesis (2007) Pernestl, A.: A Bayesian approach to fault isolation with application to diesel engine diagnosis. Thesis (2007)
10.
Zurück zum Zitat Cuppens, F., Miège, A.: Alert correlation in a cooperative intrusion detection framework. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 202–215 (2002) Cuppens, F., Miège, A.: Alert correlation in a cooperative intrusion detection framework. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 202–215 (2002)
11.
Zurück zum Zitat Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., Dubus, S., Martin, A.: Success likelihood of ongoing attacks for intrusion detection and response systems. In: 2009 International Conference on Computational Science and Engineering, vol. 3, pp. 83–91 (2009) Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., Dubus, S., Martin, A.: Success likelihood of ongoing attacks for intrusion detection and response systems. In: 2009 International Conference on Computational Science and Engineering, vol. 3, pp. 83–91 (2009)
12.
Zurück zum Zitat Schroeder, B., Gibson, G.A.: Disk failures in the real world: what does an MTTF of 1,000,000 hours mean to you? In: Proceedings of the 5th USENIX Conference on File and Storage Technologies, 1267904. USENIX Association 1 (2007) Schroeder, B., Gibson, G.A.: Disk failures in the real world: what does an MTTF of 1,000,000 hours mean to you? In: Proceedings of the 5th USENIX Conference on File and Storage Technologies, 1267904. USENIX Association 1 (2007)
13.
Zurück zum Zitat Cuppens, F., Autrel, F., Miège, A., Benferhat, S.: Recognizing malicious intention in an intrusion detection process. In: HIS, pp. 806–817 (2002) Cuppens, F., Autrel, F., Miège, A., Benferhat, S.: Recognizing malicious intention in an intrusion detection process. In: HIS, pp. 806–817 (2002)
14.
Zurück zum Zitat Rogers, J., M. Watkins, C.: Overview of the Taum Sauk Pumped Storage Power Plant Upper Reservoir Failure, Reynolds County, MO (2008) Rogers, J., M. Watkins, C.: Overview of the Taum Sauk Pumped Storage Power Plant Upper Reservoir Failure, Reynolds County, MO (2008)
15.
Zurück zum Zitat Team, F.T.S.I.: Report of findings on the overtopping and embankment breach of the upper dam - Taum Sauk pumped storage project, Report, 28 Apr 2006 Team, F.T.S.I.: Report of findings on the overtopping and embankment breach of the upper dam - Taum Sauk pumped storage project, Report, 28 Apr 2006
16.
Zurück zum Zitat Before the public service commission state of Missouri - staff’s initial incident report. Report, October 2007 Before the public service commission state of Missouri - staff’s initial incident report. Report, October 2007
17.
Zurück zum Zitat Dacier, M., Deswarte, Y., Kaâniche, M.: Quantitative assessment of operational security: models and tools. In: Katsikas, S.K., Gritzalis, D. (eds.) Information Systems Security, pp. 179–186. Chapman & Hall, London (1996) Dacier, M., Deswarte, Y., Kaâniche, M.: Quantitative assessment of operational security: models and tools. In: Katsikas, S.K., Gritzalis, D. (eds.) Information Systems Security, pp. 179–186. Chapman & Hall, London (1996)
18.
Zurück zum Zitat Weber, P., Medina-Oliva, G., Simon, C., Iung, B.: Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas. Eng. Appl. Artif. Intell. 25(4), 671–682 (2012)CrossRef Weber, P., Medina-Oliva, G., Simon, C., Iung, B.: Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas. Eng. Appl. Artif. Intell. 25(4), 671–682 (2012)CrossRef
19.
Zurück zum Zitat Boudali, H., Dugan, J.B.: A new Bayesian network approach to solve dynamic fault trees (2005) Boudali, H., Dugan, J.B.: A new Bayesian network approach to solve dynamic fault trees (2005)
Metadaten
Titel
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes
verfasst von
Edwin Bourget
Frédéric Cuppens
Nora Cuppens-Boulahia
Samuel Dubus
Simon Foley
Youssef Laarouchi
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-95729-6_3