ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS

Industrial control systems (ICS) have been widely adopted in mission-critical infrastructures. However, the increasing prevalence of cyberattacks targeting them has been a critical security concern. On the other hand, the high real-time and availability requirements of ICS limits the applicability of certain available security solutions due to the performance overhead they introduce and the system unavailability they cause. Moreover, scientific metrics (mathematical models) are not available to evaluate the efficiency and resilience of security solutions in the ICS context. Hence, in this paper, we propose ICS-SEA to address the ICS design constraints of Security, Efficiency, and Availability (SEA). Our ICS-SEA formally models the real-time constraints and physical-state resiliency quantitatively based on a typical ICS. We then design two real-world ICS testbeds and evaluate the efficiency and resilience of a few selected security solutions using our defined models. The results show that our ICS-SEA is effective to evaluate security solutions against the SEA conflicting design constraints in ICS.

[1]  Huaqun Guo,et al.  An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[2]  Luying Zhou,et al.  Applying NFV/SDN in mitigating DDoS attacks , 2017, TENCON 2017 - 2017 IEEE Region 10 Conference.

[3]  Nils Ole Tippenhauer,et al.  Legacy-Compliant Data Authentication for Industrial Control System Traffic , 2017, ACNS.

[4]  Alessandro Armando,et al.  Selective Release of Smart Metering Data in Multi-domain Smart Grids , 2014, SmartGridSec.

[5]  Luying Zhou,et al.  Mind the Gap: Security Analysis of Metro Platform Screen Door System , 2017, SG-CRC.

[6]  George C. Necula,et al.  CCured: type-safe retrofitting of legacy software , 2005, TOPL.

[7]  Huaqun Guo,et al.  Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS , 2018, ArXiv.

[8]  Derek Bruening,et al.  AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.

[9]  Ahmad-Reza Sadeghi,et al.  Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.

[10]  Jiming Chen,et al.  Privacy and performance trade-off in cyber-physical systems , 2016, IEEE Network.

[11]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[12]  Luying Zhou,et al.  A fog computing based approach to DDoS mitigation in IIoT systems , 2019, Comput. Secur..

[13]  Avishai Wool,et al.  Stealthy Deception Attacks Against SCADA Systems , 2017, CyberICPS/SECPRE@ESORICS.

[14]  Mathias Payer,et al.  CUP: Comprehensive User-Space Protection for C/C++ , 2017, AsiaCCS.

[15]  Huaqun Guo,et al.  Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems , 2018, ESSoS.

[16]  Bünyamin Ciylan,et al.  Cyber security in industrial control systems: Analysis of DoS attacks against PLCs and the insider effect , 2018, 2018 6th International Istanbul Smart Grids and Cities Congress and Fair (ICSG).

[17]  Georg Carle,et al.  The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements , 2011, IMC '11.

[18]  Daniel T Sullivan,et al.  Components of Industrial Control Systems , 2016 .

[19]  Stéphane Lafortune,et al.  Stealthy deception attacks for cyber-physical systems , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[20]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[21]  Alexandru Stefanov,et al.  SCADA modeling for performance and vulnerability assessment of integrated cyber–physical systems , 2015 .

[22]  Claude Castelluccia,et al.  Code injection attacks on harvard-architecture devices , 2008, CCS.

[23]  David K. Y. Yau,et al.  Enforcing Memory Safety in Cyber-Physical Systems , 2017, CyberICPS/SECPRE@ESORICS.

[24]  Alessandro Armando,et al.  Attribute based access control for APIs in spring security , 2014, SACMAT '14.

[25]  Luying Zhou,et al.  2FA Communication Protocol to Secure Metro Control Devices , 2019, 2019 IEEE Intelligent Transportation Systems Conference (ITSC).