skip to main content
10.1145/3447568.3448541acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicistConference Proceedingsconference-collections
research-article

Model-Driven approach to Cyber Risk Analysis in Industry 4.0

Authors Info & Claims
Published:22 March 2021Publication History

ABSTRACT

In the contest of industrial process and automation, and in particular in the so-called Industry 4.0, the now intensive application of control systems in interconnected networks has led to an increase in unexpected threats to information security for supervisory control and data acquisition (SCADA) and control systems distributed (DCS).

Risk assessment is essential and the its common methods such as HHM, IIM, and RFRM have been successfully applied to SCADA systems.

Another equally important need is the use of metrics and methodologies to analyze the risk (PRA- probability risk analysis), which includes methods such as FTA, ETA and FEMA and HAZOP. The goal of these methods is, in general, to determine the impact of a problem on the process plant and the risk reduction associated with a particular countermeasure.

In this paper we present a methodology named CRiSP (Cyber Risk Analysis in Industrial Process System Environment). CRiSP defines an approach to analyze the risk related to the manipulation of a single element of the plant and to analyze the consequence to entire plant and in the same time to a restricted portion.

References

  1. Cabinet Office, Strategic Framework and Policy Statement on Improving the Resilience of Critical Infrastructure to Disruption from Natural Hazards, 2010.Google ScholarGoogle Scholar
  2. A. Daneels and W. Salter, "What is SCADA?," International Conference on Accelerator and Large Experimental Physics Control Systems, pp. 339--343, 1999.Google ScholarGoogle Scholar
  3. V. M. Igure, S. A. Laughter, and R. D. Williams, "Security issues in SCADA networks," Computers and Security, vol. 25, no. 7, pp. 498--506, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Henrie, "Cyber security risk management in the SCADA critical infrastructure environment," Engineering Management Journal, vol. 25, no. 2, pp. 38--45, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  5. J. Guan, J. H. Graham, and J. L. Hieb, "A digraph model for risk identification and mangement in SCADA systems," presented at the Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, 2011, pp. 150--155.Google ScholarGoogle Scholar
  6. S. Patel, R. Tantalean, P. Ralston, and J. Graham, "Supervisory control and data acquisition remote terminal unit testbed," Intelligent Systems Research Laboratory Technical Report TR-ISRL-05--01, 2005.Google ScholarGoogle Scholar
  7. NIST, "System Protection Profile-Industrial Control Systems v1.0," System protection profile - industrial control systems, 2004.Google ScholarGoogle Scholar
  8. U. D. of Energy, "21 Steps to Improve Cyber Security of SCADA Networks," White Paper, 2005.Google ScholarGoogle Scholar
  9. NIST, Special Publication 800--82. Guide to Industrial Control Systems (ICS) Security, 2011.Google ScholarGoogle Scholar
  10. ENISA, Window of exposure a real problem for SCADA systems? Recommendations for Europe on SCADA patching, 2013.Google ScholarGoogle Scholar
  11. NERG, Project 2014--02 critical infrastructure protection standards version 5 revisions, 2014.Google ScholarGoogle Scholar
  12. A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, "SCADA security in the light of cyber-warfare," Computers and Security, vol. 31, no. 4, pp. 418--436, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Miller and D. C. Rowe, "A survey of SCADA and critical infrastructure incidents," presented at the RIIT'12 - Proceedings of the ACM Research in Information Technology, 2012, pp. 51--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Cheminod, L. Durante, and A. Valenzano, "Review of security issues in industrial networks," IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 277--293, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  15. H. M. Leith and J. W. Piper, "Identification and application of security measures for petrochemical industrial control systems," Journal of Loss Prevention in the Process Industries, vol. 26, no. 6, pp. 982--993, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  16. S. Kaplan and B. J. Garrick, "On The Quantitative Definition of Risk," Risk Analysis, vol. 1, no. 1, pp. 11--27, 1981.Google ScholarGoogle ScholarCross RefCross Ref
  17. ISO, ISO/IEC 27001:2005, Information Technology - Security Techniques - Information Security Management Systems - Requirements, 2015.Google ScholarGoogle Scholar
  18. C. Alberts, A. Dorofee, J. Stevens, and C. Woody, "Introduction to the OCTAVE Approach," Introduction to the OCTAVE Approach, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  19. Z. Yazar, "A qualitative risk analysis and management tool--CRAMM," SANS InfoSec Reading Room White Paper, vol. 11, pp. 12--32, 2002.Google ScholarGoogle Scholar
  20. J. Ø. Aagedal, F. Den Braber, T. Dimitrakos, B. A. Gran, D. Raptis, and K. Stolen, "Model-based risk assessment to improve enterprise security," presented at the Proceedings - 6th International Enterprise Distributed Object Computing Conference, 2002, vol. 2002-January, pp. 51--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Karabacak and I. Sogukpinar, "ISRAM: Information security risk analysis method," Computers and Security, vol. 24, no. 2, pp. 147--159, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. L. C. Briand, K. El Emam, and F. Bomarius, "COBRA: A hybrid method for software cost estimation, benchmarking, and risk assessment," presented at the Proceedings - International Conference on Software Engineering, 1998, pp. 390--399. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. S. Coles and R. Moulton, "Operationalizing IT risk management," Computers and Security, vol. 22, no. 6, pp. 487--493, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. G. Giannopoulos, R. Filippini, and M. Schimmer, "Risk assessment methodologies for critical infrastructure protection. Part I: a state of the art," Technical Notes. European Commission Joint Research Centre Institute for the Protection and Security of the Citizen Luxembourg EUR 25286 EN-2012, 2012.Google ScholarGoogle Scholar
  25. P. Kertzner, D. Bodeau, R. Nitschke, J. Watters, M. Young, and M. Stoddard, Process Control System Security Technical Risk Assessment Analysis of Problem Domain, 2005.Google ScholarGoogle Scholar
  26. P. A. S. Ralston, J. H. Graham, and J. L. Hieb, "Cyber security risk assessment for SCADA and DCS networks," ISA Transactions, vol. 46, no. 4, pp. 583--594, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  27. Y. Cherdantseva et al., "A review of cyber security risk assessment methods for SCADA systems," Computers & Security, vol. 56, pp. 1--27, Feb. 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. F. Farahmand, S. B. Navathe, G. P. Sharp, and P. H. Enslow, "Managing Vulnerabilities of Information Systems to Security Incidents," presented at the Proceedings of the ACM Conference on Electronic Commerce, 2003, vol. 5, pp. 348--354. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Y. Y. Haimes, "Hierarchical Holographic Modeling," IEEE Transactions on Systems, Man and Cybernetics, vol. 11, no. 9, pp. 606--617, 1981. Y. Y. Haimes, Risk Modeling, Assessment, and Management, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  30. C. G. Chittester and Y. Y. Haimes, "Risks of terrorism to information technology and to critical interdependent infrastructures," Journal of Homeland Security and Emergency Management, vol. 1, no. 4, pp. 25--46, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  31. K. G. Crowther and Y. Y. Haimes, "Application of the inoperability input-output model (IIM) for systemic risk assessment and management of interdependent infrastructures," Systems Engineering, vol. 8, no. 4, pp. 323--341, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M. Stamatelatos, W. Vesely, J. Dugan, J. Fragola, J. Minarick, and J. Railsback, "Fault tree handbook with aerospace applications," 2002.Google ScholarGoogle Scholar
  33. H. Kumamoto and E. J. Henley, Probabilistic Risk Assessment and Management for Engineers and Scientists, 1996.Google ScholarGoogle Scholar
  34. Lipol, Lefayet Sultan, and Jahirul Haq. "Risk analysis method: FMEA/FMECA in the organizations." International Journal of Basic & Applied Sciences 11.5 (2011): 74--82.Google ScholarGoogle Scholar
  35. Walker, Mark, and Ravi Kapadia. "Integrated Design of Online Health and Prognostics Management." Annual Conference of the Prognostics and Health Management Society. 2009.Google ScholarGoogle Scholar
  36. B. Vesely, "Fault tree analysis (FTA): Concepts and applications," NASA HQ, 2002.Google ScholarGoogle Scholar
  37. L. Scott, "Baldrige Cybersecurity Initiative," 2016.Google ScholarGoogle Scholar

Index Terms

  1. Model-Driven approach to Cyber Risk Analysis in Industry 4.0

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICIST '20: Proceedings of the 10th International Conference on Information Systems and Technologies
          June 2020
          292 pages
          ISBN:9781450376556
          DOI:10.1145/3447568

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 March 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader