Abstract
The ability to detect cyberattacks in industrial installations depends heavily on in-advance learning about potential threats and vulnerabilities, which is best done through extensive modeling. Three general types of modeling approaches exist, which are based on three pillars of science: theory, experiments, and simulation. The paper reviews the author’s take to integrate all three views.
Using the theoretical approach, the author with coworkers previously applied the Non-Functional Requirements (NFR) method to security analysis of SCADA installations. The objective of the current work is to complement and enhance it with the use of simulation and practical experiments. With respect to simulation, building models with the Monterey Phoenix tool has been applied to an IEEE standard related to SCADA security. Experimental approaches to cybersecurity rely on applying penetration testing, with tools such as Nmap or Shodan that can be useful in studying security vulnerabilities. Here, we advocate a comprehensive approach, where software tools, such as those mentioned above, could complement theoretical analysis. Work is reported on building an NFR model for SCADA security for the laboratory example with three kinds of devices (valves, flowmeters and sensors), in terms of architectural properties of the SCADA system. A practical NFR model with the use of both Monterey Phoenix tool and respective penetration experiments has been developed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
International Telecommunication Union, Recommendation X.800. Data Communication Networks: Open Systems Interconnection. Security, Structure and Applications. ITU, Geneva (1991)
Stallings, W.: Network Security Essentials. Applications and Standards. 6th edn. Pearson, New York (2017)
Sanz, R., Zalewski, J.: Pattern-based control systems engineering. IEEE Control. Syst. 23(3), 43–60 (2003)
Glimm, J., Sharp, D.H.: Complex fluid mixing flows: simulation vs. theory vs. experiment. SIAM News. 39(5) (2006)
Subramanian, N., Zalewski, J.: Quantitative assessment of safety and security of system architectures for cyberphysical systems using the NFR approach. IEEE Syst. J. 10(2), 397–409 (2016)
Monterey Phoenix Behavior Modeling Tool. https://wiki.nps.edu/display/MP/Monterey+Phoenix+Home. Accessed 18 April 2022
Shodan: The Search Engine for Internet of Everything. https://www.shodan.io/. Accessed 18 April 2022
Subramanian, N., Zalewski, J.: Safety and security integrated SIL evaluation using the NFR approach. In: Jarzabek, S., Poniszewska-Marańda, A., Madeyski, L. (eds.) Integrating Research and Practice in Software Engineering. SCI, vol. 851, pp. 53–68. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-26574-8_5
Simon, H.A.: Rational choice and the structure of the environment. Psychol. Rev. 63(2), 129–138 (1956)
IEEE Std 1711.2-2019. Secure SCADA Communications Protocol (SSCP). IEEE, New York (2020)
Leverett, E.P.: Quantitatively Assessing and Visualising Industrial System Attack Surfaces. M.Phil. Dissertation, University of Cambridge Computer Laboratory (2011)
ISA/IEC-62443-4-2: Security for Industrial Automation and Control Systems: Technical Security Requirements for IACS Components. International Society of Automation, Research Triangle Park, NC (2018)
Acknowledgments
Part of this work has been done during the author’s fellowship at the U.S. Air Force Academy. Professor Mikhail Auguston of Naval Postgraduate School is gratefully acknowledged for his guidance through the intricacies of MP. The author is grateful to anonymous reviewers for useful remarks improving the quality of the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zalewski, J. (2023). Fundamental Concepts of Modeling Computer Security in Cyberphysical Systems. In: Kowalczuk, Z. (eds) Intelligent and Safe Computer Systems in Control and Diagnostics. DPS 2022. Lecture Notes in Networks and Systems, vol 545. Springer, Cham. https://doi.org/10.1007/978-3-031-16159-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-16159-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16158-2
Online ISBN: 978-3-031-16159-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)