Abstract
Industrial control systems (ICS) have become a focal point for cyberattacks due to the shift from trusted proprietary environments. The now exposed attack surface mandates that ICS be equipped with defenses to prevent or mitigate the impact of potential attacks. Consequently, along with exploring the impact on system mission objectives, impact analysis studies need to consider implementable defenses that may reduce such impact. In this work, we equip a manufacturing ICS with three system defenses, modeled using timed automata in UPPAAL, that can perform data recovery against data corruption attacks. Additionally, we compare and contrast how capable each model is in mitigating the impact caused by data corruption attacks. The analysis provides insight into different defensive behaviors and their effectiveness, how they can be affected by attacker behaviors, and suggests some recommendations for developing future ICS defensive strategies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
The syntax and semantics of the query language used by UPPAAL is a subset of timed computation tree logic (TCTL) and can be found in [2].
References
Alur, R., Dill, D.L.: A theory of timed automata. Theoret. Comput. Sci. 126(2), 183–235 (1994)
Behrmann, G., David, A., Larsen, K.G.: A tutorial on Uppaal. In: Bernardo, M., Corradini, F. (eds.) Formal Methods for the Design of Real-Time Systems: International School on Formal Methods for the Design of Computer, Communication, and Software Systems, Bertinora, Italy, September 13–18, 2004, Revised Lectures, pp. 200–236. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg (2004)
Bracho, A., Saygin, C., Wan, H., Lee, Y., Zarreh, A.: A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems. Procedia Manuf. 26, 1116–1127 (2018)
Byres, E., Dr, P.E., Hoffman, D.: The myths and facts behind cyber security risks for industrial control systems. In: Proceedings of VDE Kongress (2004)
Cam, H., Mouallem, P., Mo, Y., Sinopoli, B., Nkrumah, B.: Modeling impact of attacks, recovery, and attackability conditions for situational awareness. In: 2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 181–187, March 2014
D’Argenio, P.R., Katoen, J.-P., Ruys, T.C., Tretmans, J.: The bounded retransmission protocol must be on time! In: Brinksma, E. (ed.) TACAS 1997. LNCS, vol. 1217, pp. 416–431. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0035403
David, A., Larsen, K.G., Legay, A., Mikučionis, M., Poulsen, D.B.: Uppaal SMC tutorial. Int. J. Softw. Tools Technol. Transfer 17(4), 397–415 (2015)
Hemsley, K., Fisher, R.: A history of cyber incidents and threats involving industrial control systems. In: ICCIP 2018. IAICT, vol. 542, pp. 215–242. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04537-1_12
Hong, J., Nuqui, R.F., Kondabathini, A., Ishchenko, D., Martin, A.: Cyber attack resilient distance protection and circuit breaker control for digital substations. IEEE Transactions on Industrial Informatics 15(7), 4332–4341, July 2019
Hota, A.R., Clements, A.A., Sundaram, S., Bagchi, S.: Optimal and game-theoretic deployment of security investments in interdependent assets. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 101–113. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47413-7_6
Hou, J., Lei, S., Yin, W., Sun, W., Hou, Y.: Cybersecurity enhancement for multi-infeed high-voltage dc systems. IEEE Trans. Smart Grid 13(4), 3227–3240, July 2022
Jawad, A., Jaskolka, J.: Analyzing the impact of cyberattacks on industrial control systems using timed automata. In: 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS), pp. 966–977, December 2021
Jawad, A., Jaskolka, J.: Modeling and simulation approaches for cybersecurity impact analysis: state-of-the-art. In: 2021 Annual Modeling and Simulation Conference (ANNSIM), pp. 1–12, July 2021
Jawad, A., Newton, L., Matrawy, A., Jaskolka, J.: A formal analysis of the efficacy of rebooting as a countermeasure against IoT botnets. In: ICC 2022 - IEEE International Conference on Communications, pp. 2206–2211, May 2022
Kim, G.H., Spafford, E.H.: The design and implementation of tripwire: a file system integrity checker. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 18–29. CCS 1994, November 1994
Kiss, I., Genge, B., Haller, P., Sebestyén, G.: A framework for testing stealthy attacks in energy grids. In: 2015 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 553–560, September 2015
Orojloo, H., Azgomi, M.A.: A stochastic game model for evaluating the impacts of security attacks against cyber-physical systems. J. Netw. Syst. Manage. 26(4), 929–965 (2018)
Rao, N.S.V., Poole, S.W., Ma, C.Y.T., He, F., Zhuang, J., Yau, D.K.Y.: Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal. 36(4), 694–710 (2016)
Yadav, G., Gauravaram, P., Jindal, A.K., Paul, K.: SmartPatch: a patch prioritization framework. Comput. Ind. 137, 103595 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Jawad, A., Jaskolka, J. (2023). Defense Models for Data Recovery in Industrial Control Systems. In: Jourdan, GV., Mounier, L., Adams, C., Sèdes, F., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2022. Lecture Notes in Computer Science, vol 13877. Springer, Cham. https://doi.org/10.1007/978-3-031-30122-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-30122-3_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30121-6
Online ISBN: 978-3-031-30122-3
eBook Packages: Computer ScienceComputer Science (R0)