Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3307630.3342397acmotherconferencesArticle/Chapter ViewAbstractPublication PagessplcConference Proceedingsconference-collections
short-paper

Ontology-Based Security Tool for Critical Cyber-Physical Systems

Published: 09 September 2019 Publication History

Abstract

Industry 4.0 considers as a new advancement concept of the industrial revolution, which introduces a full utilization of Internet technologies. This concept aims to combine diverse technological resources into the industry field, which enables the communication between two worlds: the physical and the cyber one. Cyber-physical Systems are one of the special forces that integrate and build a variety of existing technologies and components. The diversity of components and technologies creates new security threats that can exploit vulnerabilities to attack a critical system. This work introduces an ontology-based security tool-chain able to be integrated with the initial stages of the development process of critical systems. The tool detects the potential threats, and apply the suitable security requirements which can address these threats. Eventually, it uses the ontology approach to ensure that the security requirements are fulfilled.

References

[1]
Zhendong Ma, Aleksandar Hudic, Abdelkader Shaaban, and Sandor Plosz. Security viewpoint in a reference architecture model for cyber-physical production systems. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 153--159. IEEE.
[2]
Abdelkader Magdy Shaaban, Christoph Schmittner, Thomas Gruber, A. Baith Mohamed, Gerald Quirchmayr, and Erich Schikuta. CloudWoT - a reference model for knowledge-based IoT solutions. In Proceedings of the 20th International Conference on Information Integration and Web-based Applications & Services - iiWAS2018, pages 272--281. ACM Press.
[3]
ISO/IEC. Information security management systems: Overview and vocabulary. International standard, International Organization for Standardization - ISO and International Electrotechnical Commission - IEC, Geneva-Switzerland, January 2014.
[4]
IEC 62443-4-2. Industrial communication networks - network and system security -part 4-2: Technical security requirements for iaas components. Technical report, International Electrotechnical Commision, 2018.
[5]
Austrian Institute of Technology. Threatget - threat analysis and risk management. https://www.threatget.com. Accessed: 29.06.2019.
[6]
Adam Shostack. Threat modeling: Designing for security. John Wiley & Sons, 2014.
[7]
Abdelkader Magdy Shaaban, Erwin Kristen, and Christoph Schmittner. Application of iec 62443 for iot components. In International Conference on Computer Safety, Reliability, and Security, pages 214--223. Springer, 2018.
[8]
IEEE 1686. Ieee 1686-2013 - ieee standard for intelligent electronic devices cyber security capabilities. Technical report, Institute of Electrical and Electronics Engineers, 2013.
[9]
ISA. Ansi/isa-62443-4-2-2018, security for industrial automation and control systems, part 4-2: Technical security requirements for iacs components, 2018. {accessed on: 2019.06.28}.

Cited By

View all
  • (2024)A Survey of Ontologies Considering General Safety, Security, and Operation Aspects in OTIEEE Open Journal of the Industrial Electronics Society10.1109/OJIES.2024.34411125(861-885)Online publication date: 2024
  • (2023)A configurable approach to cyber-physical systems fuzzingProceedings of the 27th ACM International Systems and Software Product Line Conference - Volume B10.1145/3579028.3609005(1-5)Online publication date: 28-Aug-2023
  • (2023)An integrated outlook of Cyber–Physical Systems for Industry 4.0: Topical practices, architecture, and applicationsGreen Technologies and Sustainability10.1016/j.grets.2022.1000011:1(100001)Online publication date: Jan-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SPLC '19: Proceedings of the 23rd International Systems and Software Product Line Conference - Volume B
September 2019
252 pages
ISBN:9781450366687
DOI:10.1145/3307630
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cyber-physical system
  2. ontology
  3. security
  4. threats

Qualifiers

  • Short-paper

Conference

SPLC 2019

Acceptance Rates

Overall Acceptance Rate 167 of 463 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Survey of Ontologies Considering General Safety, Security, and Operation Aspects in OTIEEE Open Journal of the Industrial Electronics Society10.1109/OJIES.2024.34411125(861-885)Online publication date: 2024
  • (2023)A configurable approach to cyber-physical systems fuzzingProceedings of the 27th ACM International Systems and Software Product Line Conference - Volume B10.1145/3579028.3609005(1-5)Online publication date: 28-Aug-2023
  • (2023)An integrated outlook of Cyber–Physical Systems for Industry 4.0: Topical practices, architecture, and applicationsGreen Technologies and Sustainability10.1016/j.grets.2022.1000011:1(100001)Online publication date: Jan-2023
  • (2022)Security and Configurable Storage Systems in Industry 4.0 Environments: A Systematic Literature StudyOpen Conference Proceedings10.52825/ocp.v2i.1492(151-156)Online publication date: 15-Dec-2022
  • (2022)Applications of Ontology in the Internet of Things: A Systematic AnalysisElectronics10.3390/electronics1201011112:1(111)Online publication date: 27-Dec-2022
  • (2022)CLOUD TECHNOLOGIES IN LEARNING: ONTOLOGICAL APPROACHCybersecurity: Education, Science, Technique10.28925/2663-4023.2022.17.1121271:17(112-127)Online publication date: 2022
  • (2021)CARMENComputers in Industry10.1016/j.compind.2021.103524132:COnline publication date: 1-Nov-2021
  • (2021)The Knowledge Base for Automating the Architecting of Software SystemsComputational Science and Its Applications – ICCSA 202110.1007/978-3-030-86970-0_20(272-287)Online publication date: 11-Sep-2021
  • (2020)Definition and Verification of Security Configurations of Cyber-Physical SystemsComputer Security10.1007/978-3-030-64330-0_9(135-155)Online publication date: 17-Dec-2020
  • (2020)Ontology-Based Inference for Supporting Clinical Decisions in Mental HealthComputational Science – ICCS 202010.1007/978-3-030-50423-6_27(363-375)Online publication date: 15-Jun-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media