Skip to main content

Fundamental Concepts of Modeling Computer Security in Cyberphysical Systems

  • Conference paper
  • First Online:
Intelligent and Safe Computer Systems in Control and Diagnostics (DPS 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 545))

Included in the following conference series:

  • 250 Accesses

Abstract

The ability to detect cyberattacks in industrial installations depends heavily on in-advance learning about potential threats and vulnerabilities, which is best done through extensive modeling. Three general types of modeling approaches exist, which are based on three pillars of science: theory, experiments, and simulation. The paper reviews the author’s take to integrate all three views.

Using the theoretical approach, the author with coworkers previously applied the Non-Functional Requirements (NFR) method to security analysis of SCADA installations. The objective of the current work is to complement and enhance it with the use of simulation and practical experiments. With respect to simulation, building models with the Monterey Phoenix tool has been applied to an IEEE standard related to SCADA security. Experimental approaches to cybersecurity rely on applying penetration testing, with tools such as Nmap or Shodan that can be useful in studying security vulnerabilities. Here, we advocate a comprehensive approach, where software tools, such as those mentioned above, could complement theoretical analysis. Work is reported on building an NFR model for SCADA security for the laboratory example with three kinds of devices (valves, flowmeters and sensors), in terms of architectural properties of the SCADA system. A practical NFR model with the use of both Monterey Phoenix tool and respective penetration experiments has been developed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. International Telecommunication Union, Recommendation X.800. Data Communication Networks: Open Systems Interconnection. Security, Structure and Applications. ITU, Geneva (1991)

    Google Scholar 

  2. Stallings, W.: Network Security Essentials. Applications and Standards. 6th edn. Pearson, New York (2017)

    Google Scholar 

  3. Sanz, R., Zalewski, J.: Pattern-based control systems engineering. IEEE Control. Syst. 23(3), 43–60 (2003)

    Article  Google Scholar 

  4. Glimm, J., Sharp, D.H.: Complex fluid mixing flows: simulation vs. theory vs. experiment. SIAM News. 39(5) (2006)

    Google Scholar 

  5. Subramanian, N., Zalewski, J.: Quantitative assessment of safety and security of system architectures for cyberphysical systems using the NFR approach. IEEE Syst. J. 10(2), 397–409 (2016)

    Article  Google Scholar 

  6. Monterey Phoenix Behavior Modeling Tool. https://wiki.nps.edu/display/MP/Monterey+Phoenix+Home. Accessed 18 April 2022

  7. Shodan: The Search Engine for Internet of Everything. https://www.shodan.io/. Accessed 18 April 2022

  8. Subramanian, N., Zalewski, J.: Safety and security integrated SIL evaluation using the NFR approach. In: Jarzabek, S., Poniszewska-Marańda, A., Madeyski, L. (eds.) Integrating Research and Practice in Software Engineering. SCI, vol. 851, pp. 53–68. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-26574-8_5

    Chapter  Google Scholar 

  9. Simon, H.A.: Rational choice and the structure of the environment. Psychol. Rev. 63(2), 129–138 (1956)

    Article  Google Scholar 

  10. IEEE Std 1711.2-2019. Secure SCADA Communications Protocol (SSCP). IEEE, New York (2020)

    Google Scholar 

  11. Leverett, E.P.: Quantitatively Assessing and Visualising Industrial System Attack Surfaces. M.Phil. Dissertation, University of Cambridge Computer Laboratory (2011)

    Google Scholar 

  12. ISA/IEC-62443-4-2: Security for Industrial Automation and Control Systems: Technical Security Requirements for IACS Components. International Society of Automation, Research Triangle Park, NC (2018)

    Google Scholar 

Download references

Acknowledgments

Part of this work has been done during the author’s fellowship at the U.S. Air Force Academy. Professor Mikhail Auguston of Naval Postgraduate School is gratefully acknowledged for his guidance through the intricacies of MP. The author is grateful to anonymous reviewers for useful remarks improving the quality of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Janusz Zalewski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zalewski, J. (2023). Fundamental Concepts of Modeling Computer Security in Cyberphysical Systems. In: Kowalczuk, Z. (eds) Intelligent and Safe Computer Systems in Control and Diagnostics. DPS 2022. Lecture Notes in Networks and Systems, vol 545. Springer, Cham. https://doi.org/10.1007/978-3-031-16159-9_11

Download citation

Publish with us

Policies and ethics