Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering

The spectre of cyber attacks on aerospace systems can can no longer be ignored, given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attackhas the goal to preserve critical mission objectives in the presence of adversarial activity. Which invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system. To capture this detailed and rigorous understanding, a structured approach for modeling aerospace systems has been developed. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group’s Systems Modeling Language to represent the system being analyzed and also utilize model transformations to provide relevant aspects of the model to specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. A graph-based propagation analysis based on edge and node labels is used to analyze the model.

[1]  C.J.H. Mann,et al.  A Practical Guide to SysML: The Systems Modeling Language , 2009 .

[2]  Lingyu Wang,et al.  Measuring Network Security Using Bayesian Network-Based Attack Graphs , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.

[3]  Gabriel Jakobson,et al.  Mission cyber security situation assessment using impact dependency graphs , 2011, 14th International Conference on Information Fusion.

[4]  Shanchieh Jay Yang,et al.  VTAC: virtual terrain assisted impact assessment for cyber attacks , 2008, SPIE Defense + Commercial Sensing.

[5]  Christopher L. Delp,et al.  An operations concept for Integrated Model-Centric Engineering at JPL , 2010, 2010 IEEE Aerospace Conference.

[6]  Sushil Jajodia,et al.  Measuring network security using dynamic bayesian network , 2008, QoP '08.

[7]  Gábor Csárdi,et al.  The igraph software package for complex network research , 2006 .

[8]  Peng Liu,et al.  Using Bayesian networks for cyber security analysis , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).