Abstract
In the last decade, the amount of cyber-attacks targeting industrial facilities with specialized knowledge, tools and malware increased dramatically. The wide variety of industrial IT-systems and various required expertise for cyber-physical attack modeling is currently a challenge for interdisciplinary research. To address the variety of systems and get a point of reference, we merged architecture descriptions from available resources. Based on this reference architecture, we introduce attack scopes and provide exemplary attack scenarios per scope. As modeling strategy for the introduced scopes and to realize abstracted representations of particular industrial facility architectures, a component-based modeling approach is proposed. The main contribution of the presented work is a first generic attack modeling technique facilitating the required interdisciplinary collaboration in this important field of research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
ICS-CERT: IR-ALERT-H-16-056-01 Cyber-Attack Against Ukrainian Critical Infrastructure. https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01 (2016)
Harp, D., Gregory-Brown, B.: The State of Security in Control Systems Today. https://www.sans.org/reading-room/whitepapers/analyst/state-security-control-systems-today-36042 (2015)
Cherdantseva, Y., Hilton, J.: A reference model of information assurance & security. In: Eighth International Conference on Availability, Reliability and Security (ARES), pp. 546–555. IEEE (2013)
Lang, A., Dittmann, J., Kiltz, S., Hoppe, T.: Future perspectives: the car and its IP-address – a potential safety and security risk assessment. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 40–53. Springer, Heidelberg (2007)
U.S. Department of Homeland Security: Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies. https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/Defense_in_Depth_Oct09.pdf (2009)
Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., Hahn, A.: Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology (2015)
Krotofil, M., Gollmann, D.: Industrial control systems security: what is happening? In: 2013 11th IEEE International Conference on Industrial Informatics (INDIN), pp. 670–675. IEEE (2013)
Ahmed, I., Obermeier, S., Naedele, M., Richard III, G.G.: SCADA systems: challenges for forensic investigators. Computer 45, 44–51 (2012)
Howard, J.D., Longstaff, T.A.: A common language for computer security incidents. Sandia National Laboratories (1998)
Kordy, B., Piètre-Cambacédès, L., Schweitzer, P.: DAG-based attack and defense modeling: don’t miss the forest for the attack trees. Comput. Sci. Rev. 13–14, 1–38 (2014)
Bendik, F., Schmidt, N.: Exchange of engineering data for communication systems based on AutomationML using an EtherNet/IP example. Presented at the ODVA Industry Conference and 17th Annual Meeting, Friso, Texas, USA (2015)
Sommestad, T., Ekstedt, M., Holm, H.: The cyber security modeling language: a tool for assessing the vulnerability of enterprise system architectures. Syst. J. IEEE 7, 363–373 (2013)
Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Assessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastruct. 9, 93–110 (2013)
U.S. Department of Homeland Security: Seven Steps to Effectively Defend Industrial Control Systems. https://ics-cert.us-cert.gov/sites/default/files/documents/Seven%20Steps%20to%20Effectively%20Defend%20Industrial%20Control%20Systems_S508C.pdf (2016)
The MITRE Corporation: CVE-2016-2200 (2016)
Floyd, S.: RFC 3360 Inappropriate TCP Resets Considered Harmful. https://tools.ietf.org/html/rfc3360 (2002)
CENELEC: EN 61158-4-3:2014: Industrial communication networks - Fieldbus specifications - Part 4-3: Data-link layer protocol specification - Type 3 elements (IEC 61158-4-3:2014) (2014)
The MITRE Corporation: CVE-2015-1356 (2015)
The MITRE Corporation: CVE-2010-2772 (2010)
Object Management Group: OMG Unified Modeling Language (OMG UML) Version 2.5. http://www.omg.org/spec/UML/2.5 (2015)
Mauerer, W.: Professional Linux Kernel Architecture. Wiley, Indianapolis (2008)
Tanenbaum, A.S.: Modern Operating Systems. Pearson Education, Upper Saddle River (2009)
Siemens AG: CPU-CPU Communication with SIMATIC Controllers (SIMATIC S7) Version 2.1. https://cache.industry.siemens.com/dl/files/908/78028908/att_32073/v1/78028908_SIMATIC_Comm_DOKU_v21_e.pdf (2013)
ISO/IEC: ISO/IEC 7498-1:1994(E) Information technology - Open Systems Interconnection - Basic Reference Model (1994)
Fischer, R., Clausing, R., Dittmann, J., Ding, Y.: Industrie 4.0 Schwachstellen: Basisangriffe und Szenarien. In: Proceedings of DACH Security 2016 (2016, to appear)
Acknowledgements
The presented work is funded by the German Federal Ministry of Economic Affairs and Energy (BMWi, project no. 1501502A, 1501502B) in the framework of the German reactor safety research program. The authors thank all project partners and reviewers for their helpful comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Clausing, R., Fischer, R., Dittmann, J., Ding, Y. (2016). Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack Modeling. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2016. Lecture Notes in Computer Science(), vol 9922. Springer, Cham. https://doi.org/10.1007/978-3-319-45477-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-45477-1_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45476-4
Online ISBN: 978-3-319-45477-1
eBook Packages: Computer ScienceComputer Science (R0)