Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Modelling and evaluation of the security of cyber-physical systems using stochastic Petri nets

This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber-physical systems (CPSs) in the face of malicious attacks. The basic idea behind the proposed model is to evaluate the security of control loops equipped with intrusion detection systems (IDSs) faced with security attacks. The quantitative analysis is performed in terms of system-focused quantitative security measures, such as mean time-to-failure and availability. By using this model, one can investigate the effects of some attacks and defensive parameters, including the detection interval, the time to physical disruption, and the false-positive probability of IDSs. This evaluation results can help to improve the security countermeasures of CPSs.

References

    1. 1)
      • 13. Mitchell, R., Chen, I.R.: ‘Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems’, IEEE Trans. Reliab., 2015, 65, pp. 350358.
    2. 2)
      • 22. Mitchell, R., Chen, I.R.: ‘A survey of intrusion detection techniques in cyber physical systems’, ACM Comput. Surv., 2014, 46, pp. 129.
    3. 3)
      • 12. Ni, S., Zhuang, Y., Gu, J., et al: ‘A formal model and risk assessment method for security-critical real-time embedded systems’, Comput. Secur., 2016, 58, pp. 199215.
    4. 4)
      • 4. Krotofil, M., Larsen, J., Gollmann, D.: ‘The process matters: ensuring data veracity in cyber-physical systems’. Proc. of the 10th ACM Symp. on Information, Computer and Communications Security (ASIA CCS ‘15), Singapore, April 2015, pp. 133144.
    5. 5)
      • 26. Kowalewski, S., Stursberg, O., Fritz, M., et al: ‘A case study in tool-aided analysis of discretely controlled continuous systems: the two tanks problem’. Proc. of the 15th Int. Workshop on Hybrid Systems (HS V), Grenoble, France, 1997, pp. 163185.
    6. 6)
      • 17. Marin, A., Balsamo, S., Harrison, P.G.: ‘Analysis of stochastic Petri nets with signals’, Perform. Eval., 2012, 69, (11), pp. 551572.
    7. 7)
      • 11. Rahimi, S., Zargham, M.: ‘Analysis of the security of VPN configurations in industrial control environments’, J. Crit. Infrastruct. Prot., 2012, 5, (1), pp. 313.
    8. 8)
      • 19. Gallina, L., Dei Rossi, G.L., Marin, A., et al: ‘Evaluating resistance to jamming and casual interception in mobile wireless networks’. Proc. of the 15th ACM Int. Conf. on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Paphos, Cyprus, 2012, pp. 151158.
    9. 9)
      • 6. Ashibani, Y., Mahmoud, Q.H.: ‘Cyber physical systems security: analysis, challenges and solutions’, Comput. Secur., 2017, 68, pp. 8197.
    10. 10)
      • 15. Genge, B., Siaterlis, C., Hohenadel, M.: ‘Impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems’, Int. J. Comput. Commun. Control, 2014, 7, pp. 674687.
    11. 11)
      • 24. Madan, B., Goševa-Popstojanova, K., Vaidyanathan, K., et al: ‘A method for modeling and quantifying the security attributes of intrusion tolerant systems’, Perform. Eval., 2004, 56, (1), pp. 167186.
    12. 12)
      • 2. Nguyen, H.P., Shaukat, A., Yue, T.: ‘Model-based security engineering for cyber-physical systems: a systematic mapping study’, Inf. Softw. Technol., 2017, 83, pp. 116135.
    13. 13)
      • 1. Burmester, M., Magkos, E., Chrissikopoulos, V.: ‘Modeling security in cyber-physical systems’, Int. J. Crit. Infrastruct. Prot., 2012, 5, (3–4), pp. 118126.
    14. 14)
      • 20. Orojloo, H., Abdollahi Azgomi, M.: ‘A method for evaluating the consequence propagation of security attacks in cyber–physical systems’, Future Gener. Comput. Syst., 2017, 67, pp. 5771.
    15. 15)
      • 14. Krotofil, M., Cárdenas, A.A., Larsen, J., et al: ‘Vulnerabilities of cyber-physical systems to stale data-determining the optimal time to launch attacks’, Int. J. Crit. Infrastruct. Prot., 2014, 7, pp. 213232.
    16. 16)
      • 23. Chen, T.M., Sanchez-Aarnoutse, J.C., Buford, J.: ‘Petri net modeling of cyber-physical attacks on smart grid’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 741749.
    17. 17)
      • 18. Horváth, A., Paolieri, M., Ridi, L., et al: ‘Transient analysis of non-Markovian models using stochastic state classes’, Perform. Eval., 2012, 69, (7–8), pp. 315335.
    18. 18)
      • 9. Sharma, A.B., Ivančić, F., Niculescu-Mizil, A., et al: ‘Modeling and analytics for cyber-physical systems in the age of big data’, ACM SIGMETRICS Perform. Eval. Rev., 2014, 41, pp. 7477.
    19. 19)
      • 10. Mitchell, R., Chen, I.R.: ‘Effect of intrusion detection and response on reliability of cyber physical systems’, IEEE Trans. Rel., 2013, 62, (1), pp. 199210.
    20. 20)
      • 7. Molloy, M.K.: ‘Performance analysis using stochastic Petri nets’, IEEE Trans. Comput., 1982, 31, (9), pp. 913917.
    21. 21)
      • 3. Lee, E.A., Seshia, S.A.: ‘Introduction to embedded systems – a cyber-physical systems approach’ (MIT Press, Cambridge, Massachusetts, USA, 2017, 2nd edn.).
    22. 22)
      • 16. Zhu, Q., Başar, T.: ‘A dynamic game-theoretic approach to resilient control system design for cascading failures’. Proc. of the 1st int. Conf. on High Confidence Networked Systems, Beijing, China, 2012, pp. 4146.
    23. 23)
      • 5. Krotofil, M., Larsen, J.: ‘Are you threatening my hazards?’. Proc. of 9th Int. Workshop on Security (IWSEC'14), Hirosaki, Japan, August 2014, pp. 1732.
    24. 24)
      • 21. Kopetz, H.: ‘Real-time systems: design principles for distributed embedded applications’, Real-Time Systems Series (Springer, Berlin, Germany, 2011, 2nd edn.).
    25. 25)
      • 8. Marsan, M.A., Balbo, G., Conte, G., et al: ‘Modelling with generalized stochastic Petri nets’ (John Wiley & Sons Inc., New York, NY, USA, 1994).
    26. 26)
      • 25. Trivedi, K.S.: ‘Probability and statistics with reliability, queuing, and computer science applications’ (John Wiley & Sons Ltd., Chichester, UK, 2001, 2nd edn.).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2018.0008
Loading

Related content

content/journals/10.1049/iet-cps.2018.0008
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address