A Threat-Vulnerability Based Risk Analysis Model for Cyber Physical System Security
نویسندگان
چکیده
The ability to network machinery and devices that are otherwise isolated is highly attractive to industry. This has led to growth in the use of cyber-physical systems (CPSs) with existing infrastructure. However, coupling physical and cyber processes leaves CPSs vulnerable to security attacks. A threat-vulnerability based risk model is developed through a detailed analysis of CPS security attack structures and threats. The Stuxnet malware attack is used to test the viability of the proposed model. An analysis of the Natanz system shows that, with an actual case security-risk score at Mitigation level 5, the infested facilities barely avoided a situation worse than the one which occurred. The paper concludes with a discussion on the need for risk analysis as part of CPS security and highlights the future work of modelling and comparing existing security solutions using the proposed model so to identify the sectors where CPS security is still lacking.
منابع مشابه
A New Multilevel Framework for Cyber-Physical System Security
Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. In this paper, a security fr...
متن کاملReconciling Malicious and Accidental Risk in Cyber Security
Consider the question whether a cyber security investment is cost-effective. The result will depend on the expected frequency of attacks. Contrary to what is referred to as threat event frequencies or hazard rates in safety risk management, frequencies of targeted attacks are not independent from system design, due to the strategic behaviour of attackers. Although there are risk assessment meth...
متن کاملIntroduction to the Cyber-of-Things: Cyber-crimes and Cyber-Security Mini-track
The continuous amalgamation of technology into the ever increasing facets of everyday life are conducive to encouraging cyber-crimes and cybersecurity evolution and diversification. Hence, responses that address resulting concerns presented in this mini-track include ‘A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams’, ‘A ThreatVulnerability Bas...
متن کاملSecurity and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach
The purpose of this chapter is to (1) introduce notions of security for the physical dynamics of complex cyber-physical networks and (2) provide a tutorial on control-theoretic tools for network inference that are promising for evaluation of such dynamic notions of security. Classically, computer scientists and infrastructure network engineers have conceptualized the modeling and resolution of ...
متن کاملVulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits
In recent years, the number of software vulnerabilities discovered has grown significantly. This creates a need for prioritizing the response to new disclosures by assessing which vulnerabilities are likely to be exploited and by quickly ruling out the vulnerabilities that are not actually exploited in the real world. We conduct a quantitative and qualitative exploration of the vulnerability-re...
متن کامل