2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX 2008
DOI: 10.1109/depcos-relcomex.2008.23
|View full text |Cite
|
Sign up to set email alerts
|

Applying F(I)MEA-technique for SCADA-Based Industrial Control Systems Dependability Assessment and Ensuring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2009
2009
2023
2023

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 4 publications
0
12
0
1
Order By: Relevance
“…A third paper uses Failure Mode Effects Analysis (FMEA) to extend the concept to include intrusion detection or F(I)MEA. A tabular example is provided and this is an excellent method to identify system elements that could cause system failures due to intrusions [7]. The fourth and fifth papers provided three attacks to consider in SCADA system Intrusion Detection.…”
Section: Ids Technologies and Related Workmentioning
confidence: 99%
“…A third paper uses Failure Mode Effects Analysis (FMEA) to extend the concept to include intrusion detection or F(I)MEA. A tabular example is provided and this is an excellent method to identify system elements that could cause system failures due to intrusions [7]. The fourth and fifth papers provided three attacks to consider in SCADA system Intrusion Detection.…”
Section: Ids Technologies and Related Workmentioning
confidence: 99%
“…unrealized countermeasures) the Intrusion Modes, Effects and Criticality Analysis IMECA should be executed. IMECA is a modification of FMEA (Failure Modes and Effects Analysis) which takes into account possible intrusions to the system [12]. Since any vulnerability can become a failure if an intrusion occurs, the IMECA should be used.…”
Section: Description Of the Cybersecurity Assurance Case-oriented Tecmentioning
confidence: 99%
“…• functional safety, when failure criticality is assessed using probability p f and consequences u f (FME(C)A-or SFME(C)A-tables); • information security, when interactions v f are taking into account (in this case we get F(I)MEA-table [16]); • survivability, when it is necessary to take into account physical actions v pf , information actions v if and system degradation level (it could be described by parameter u f or its specific part u f (v)). Parameter u f (v) is oriented to assessment of system operation quality decrease, description could be done using degradation diagrams, so-called QD-diagrams [22].…”
Section: Assessed Attributes and Used Meansmentioning
confidence: 99%
“…It is confirmed in the recent publications that method is appropriate for security assessment using F(I)MEA (Failure(Intrusion) Modes and Effects Analysis)-technique, failure effects analysis from the recovery time view etc. [15][16]. Other example is that FME(C)A-approach jointly with FTA was extended for reliability analysis at the software architecture design level [17].…”
Section: Introduction and Problem Statementmentioning
confidence: 97%