Nothing Special   »   [go: up one dir, main page]

Skip to main content

Defense Models for Data Recovery in Industrial Control Systems

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2022)

Abstract

Industrial control systems (ICS) have become a focal point for cyberattacks due to the shift from trusted proprietary environments. The now exposed attack surface mandates that ICS be equipped with defenses to prevent or mitigate the impact of potential attacks. Consequently, along with exploring the impact on system mission objectives, impact analysis studies need to consider implementable defenses that may reduce such impact. In this work, we equip a manufacturing ICS with three system defenses, modeled using timed automata in UPPAAL, that can perform data recovery against data corruption attacks. Additionally, we compare and contrast how capable each model is in mitigating the impact caused by data corruption attacks. The analysis provides insight into different defensive behaviors and their effectiveness, how they can be affected by attacker behaviors, and suggests some recommendations for developing future ICS defensive strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://uppaal.org/downloads/#academic-licenses/.

  2. 2.

    The syntax and semantics of the query language used by UPPAAL is a subset of timed computation tree logic (TCTL) and can be found in [2].

References

  1. Alur, R., Dill, D.L.: A theory of timed automata. Theoret. Comput. Sci. 126(2), 183–235 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  2. Behrmann, G., David, A., Larsen, K.G.: A tutorial on Uppaal. In: Bernardo, M., Corradini, F. (eds.) Formal Methods for the Design of Real-Time Systems: International School on Formal Methods for the Design of Computer, Communication, and Software Systems, Bertinora, Italy, September 13–18, 2004, Revised Lectures, pp. 200–236. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Bracho, A., Saygin, C., Wan, H., Lee, Y., Zarreh, A.: A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems. Procedia Manuf. 26, 1116–1127 (2018)

    Article  Google Scholar 

  4. Byres, E., Dr, P.E., Hoffman, D.: The myths and facts behind cyber security risks for industrial control systems. In: Proceedings of VDE Kongress (2004)

    Google Scholar 

  5. Cam, H., Mouallem, P., Mo, Y., Sinopoli, B., Nkrumah, B.: Modeling impact of attacks, recovery, and attackability conditions for situational awareness. In: 2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 181–187, March 2014

    Google Scholar 

  6. D’Argenio, P.R., Katoen, J.-P., Ruys, T.C., Tretmans, J.: The bounded retransmission protocol must be on time! In: Brinksma, E. (ed.) TACAS 1997. LNCS, vol. 1217, pp. 416–431. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0035403

    Chapter  Google Scholar 

  7. David, A., Larsen, K.G., Legay, A., Mikučionis, M., Poulsen, D.B.: Uppaal SMC tutorial. Int. J. Softw. Tools Technol. Transfer 17(4), 397–415 (2015)

    Article  Google Scholar 

  8. Hemsley, K., Fisher, R.: A history of cyber incidents and threats involving industrial control systems. In: ICCIP 2018. IAICT, vol. 542, pp. 215–242. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04537-1_12

    Chapter  Google Scholar 

  9. Hong, J., Nuqui, R.F., Kondabathini, A., Ishchenko, D., Martin, A.: Cyber attack resilient distance protection and circuit breaker control for digital substations. IEEE Transactions on Industrial Informatics 15(7), 4332–4341, July 2019

    Google Scholar 

  10. Hota, A.R., Clements, A.A., Sundaram, S., Bagchi, S.: Optimal and game-theoretic deployment of security investments in interdependent assets. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 101–113. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47413-7_6

    Chapter  MATH  Google Scholar 

  11. Hou, J., Lei, S., Yin, W., Sun, W., Hou, Y.: Cybersecurity enhancement for multi-infeed high-voltage dc systems. IEEE Trans. Smart Grid 13(4), 3227–3240, July 2022

    Google Scholar 

  12. Jawad, A., Jaskolka, J.: Analyzing the impact of cyberattacks on industrial control systems using timed automata. In: 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS), pp. 966–977, December 2021

    Google Scholar 

  13. Jawad, A., Jaskolka, J.: Modeling and simulation approaches for cybersecurity impact analysis: state-of-the-art. In: 2021 Annual Modeling and Simulation Conference (ANNSIM), pp. 1–12, July 2021

    Google Scholar 

  14. Jawad, A., Newton, L., Matrawy, A., Jaskolka, J.: A formal analysis of the efficacy of rebooting as a countermeasure against IoT botnets. In: ICC 2022 - IEEE International Conference on Communications, pp. 2206–2211, May 2022

    Google Scholar 

  15. Kim, G.H., Spafford, E.H.: The design and implementation of tripwire: a file system integrity checker. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 18–29. CCS 1994, November 1994

    Google Scholar 

  16. Kiss, I., Genge, B., Haller, P., Sebestyén, G.: A framework for testing stealthy attacks in energy grids. In: 2015 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 553–560, September 2015

    Google Scholar 

  17. Orojloo, H., Azgomi, M.A.: A stochastic game model for evaluating the impacts of security attacks against cyber-physical systems. J. Netw. Syst. Manage. 26(4), 929–965 (2018)

    Article  Google Scholar 

  18. Rao, N.S.V., Poole, S.W., Ma, C.Y.T., He, F., Zhuang, J., Yau, D.K.Y.: Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal. 36(4), 694–710 (2016)

    Article  Google Scholar 

  19. Yadav, G., Gauravaram, P., Jindal, A.K., Paul, K.: SmartPatch: a patch prioritization framework. Comput. Ind. 137, 103595 (2022)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alvi Jawad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jawad, A., Jaskolka, J. (2023). Defense Models for Data Recovery in Industrial Control Systems. In: Jourdan, GV., Mounier, L., Adams, C., Sèdes, F., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2022. Lecture Notes in Computer Science, vol 13877. Springer, Cham. https://doi.org/10.1007/978-3-031-30122-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30122-3_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30121-6

  • Online ISBN: 978-3-031-30122-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics