Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: 1 physical only attack, 2 cyber only attack, 3 physical-enabled cyber attack, 4 cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilities which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.
[1]
Mathias Ekstedt,et al.
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
,
2009
.
[2]
Richard Lippmann,et al.
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
,
2009,
2009 Annual Computer Security Applications Conference.
[3]
Moises Sudit,et al.
Cyber attack modeling and simulation for network security analysis
,
2007,
2007 Winter Simulation Conference.
[4]
Jeffrey S. Smith,et al.
Discrete-event simulation for the design and evaluation of physical protection systems
,
1998,
1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).
[5]
Peter A. Beling,et al.
Quantitative assessment of cyber security risk using bayesian network-based model
,
2009,
2009 Systems and Information Engineering Design Symposium.