Abstract
Defensive actions in critical infrastructure environments will increasingly require automated agents to manage the complex, dynamic interactions that occur between operators and malicious actors. Characterizing such agent behavior requires the ability to reason about distributed environments where the state of a channel or process depends on the actions of the opposing sides. This paper describes an extension to the Applied π-Calculus for modeling agent behavior in critical infrastructure environments. The utility of the extension is demonstrated via an agent-based attack and defense interaction scenario.
Chapter PDF
Similar content being viewed by others
References
S. Boyer, Supervisory Control and Data Acquisition, ISA, Research Triangle Park, North Carolina, 2010.
S. Braynov and M. Jadliwala, Representation and analysis of coordinated attacks, Proceedings of the ACM Workshop on Formal Methods in Security Engineering, pp. 43–51, 2003.
S. Braynov and M. Jadliwala, Detecting malicious groups of agents, Proceedings of the First IEEE Symposium on Multi-Agent Security and Survivability, pp. 90–99, 2004.
T. Chen, Stuxnet, the real start of cyber warfare? IEEE Network, vol. 24(6), pp. 2–3, 2010.
B. Genge and C. Siaterlis, Investigating the effect of network parameters on coordinated cyber attacks against a simulated power plant, Proceedings of the Sixth International Workshop on Critical Information Infrastructure Security, 2011.
R. Krutz, Securing SCADA Systems, Wiley, Indianapolis, Indiana, 2006.
T. McEvoy and S. Wolthusen, A formal adversary capability model for SCADA environments, Proceedings of the Fifth International Workshop on Critical Information Infrastructure Security, pp. 93–103, 2010.
T. McEvoy and S. Wolthusen, A plant-wide industrial process control security problem, in Critical Infrastructure Protection V, J. Butts and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 47–56, 2011.
T. McEvoy and S. Wolthusen, Defeating node-based attacks on SCADA systems using probabilistic packet observation, Proceedings of the Sixth International Workshop on Critical Information Infrastructure Security, 2011.
S. McLaughlin, On dynamic malware payloads aimed at programmable logic controllers, Proceedings of the Sixth USENIX Conference on Hot Topics in Security, p. 10, 2011.
C. Patsakis and N. Alexandris, New malicious agents and SK virii, Proceedings of the International Multi-Conference on Computing in the Global Information Technology, p. 29, 2007.
D. Sangiorgi and D. Walker, π-Calculus: A theory of mobile processes, Cambridge University Press, Cambridge, United Kingdom, 2001.
D. Song and A. Perrig, Advanced and authenticated marking schemes for IP traceback, Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 878–886, 2001.
G. Tesauro, D. Chess, W. Walsh, R. Das, A. Segal, I. Whalley, J. Kephart and S. White, A multi-agent systems approach to autonomic computing, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 464–471, 2004.
M. Wooldridge, An Introduction to MultiAgent Systems, Wiley, Chichester, United Kingdom, 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
McEvoy, T., Wolthusen, S. (2012). Agent Interaction and State Determination in SCADA Systems. In: Butts, J., Shenoi, S. (eds) Critical Infrastructure Protection VI. ICCIP 2012. IFIP Advances in Information and Communication Technology, vol 390. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35764-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-35764-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35763-3
Online ISBN: 978-3-642-35764-0
eBook Packages: Computer ScienceComputer Science (R0)