Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study

Existing methodologies for the design of complex public infrastructure are effective in creating efficient systems such as for water treatment, electric power grid, and transportation. While such methodologies and the associated design tools account for potential component and subsystem failures, they generally ignore the cyber threats; such threats are now real. This paper presents a step towards a methodology that incorporates cyber security at an early stage in the design of complex systems. A novel graph theoretic mechanism, named Dynamic State Condition Graph, is proposed to capture the relationships among sensors and actuators in a cyber physical system and the functions that are affected when the state of an actuator changes. Through a case study on a modern and realistic testbed, it is shown that introducing security at an early stage will likely impact the design of the control software; it may also lead to additional hardware and/or software requirements, e.g., sensors, or secure control algorithms. Such impact on the system design promises to improve the resilience of a system to cyber attacks.

[1]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[2]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[3]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[4]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[5]  Byron S. Gottfried Schaum's Outline of Programming with C , 1994 .

[6]  Thomas M. Chen,et al.  Petri Net Modeling of Cyber-Physical Attacks on Smart Grid , 2011, IEEE Transactions on Smart Grid.

[7]  Changrui Ren,et al.  A new connected device-based Failure Mode and Effects Analysis model , 2014, Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, and Informatics.

[8]  Bradley R. Schmerl,et al.  View Consistency in Architectures for Cyber-Physical Systems , 2011, 2011 IEEE/ACM Second International Conference on Cyber-Physical Systems.

[9]  Jason Edwin Stamp,et al.  COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS , 2003 .

[10]  Mihai Budiu,et al.  Control-flow integrity principles, implementations, and applications , 2009, TSEC.

[11]  Edward A. Lee,et al.  Aspect-oriented modeling of attacks in automotive Cyber-Physical Systems , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).

[12]  Aditya P. Mathur,et al.  Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[13]  C. Kara-Zaitri,et al.  An improved FMEA methodology , 1991, Annual Reliability and Maintainability Symposium. 1991 Proceedings.

[14]  Gerhard P Hancke,et al.  Introduction to Industrial Control Networks , 2013, IEEE Communications Surveys & Tutorials.

[15]  Catherine A. Meadows Introduction to ACM TISSEC special issue on CCS 2005 , 2009, TSEC.

[16]  Mathias Ekstedt,et al.  Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models , 2009 .

[17]  Sushil Jajodia,et al.  Advanced Cyber Attack Modeling Analysis and Visualization , 2010 .

[18]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[19]  Andrea Bondavalli,et al.  Graphical Formalisms For Modelling CriticalInfrastructures , 2012 .

[20]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[21]  Bruno Sinopoli,et al.  Robust detection in the presence of integrity attacks , 2012, 2012 American Control Conference (ACC).

[22]  William H. Sanders,et al.  Go with the flow: toward workflow-oriented security assessment , 2013, NSPW '13.