2022
DOI: 10.1109/tdsc.2021.3093214
|View full text |Cite
|
Sign up to set email alerts
|

Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems

Abstract: Recent cyber-physical attacks, such as Stuxnet, Triton etc., have invoked an ominous realization about the vulnerability of critical infrastructure, including water, power and gas distribution systems. Traditional IT security-biased protection methods that focus on improving cyber hygiene are largely impotent in the face of targeted attacks by advanced cyber-adversaries. Thus, there is an urgent need to analyze the safety and security of critical infrastructure in a holistic fashion, leveraging the physics of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…[17] uses STPA to analyse the impact of cyber-attacks against an industrial control system. More recently, Khan and Madnick [16] proposed a framework grounded in STPA to identify mitigations against attacks to the CPS. Authors of [6] proposed a methodology based on STPA and simulations of system behaviour to evaluate the impact of different types of attacks against a Communication Based Train Control System, and suggested the use of logical attack graphs to quantify the risk of safety critical attacks.…”
Section: Related Workmentioning
confidence: 99%
“…[17] uses STPA to analyse the impact of cyber-attacks against an industrial control system. More recently, Khan and Madnick [16] proposed a framework grounded in STPA to identify mitigations against attacks to the CPS. Authors of [6] proposed a methodology based on STPA and simulations of system behaviour to evaluate the impact of different types of attacks against a Communication Based Train Control System, and suggested the use of logical attack graphs to quantify the risk of safety critical attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In forward-looking analyses based on STAMP, Logan et al [20] analyzed an autonomous space system using the STPA-Sec method to elicit system security requirements while Martin et al [21] applied STPA-Sec to study security considerations in aerial refueling. Meanwhile, Khan & Madnick [6], presented the STAMP-based Cybersafety analysis of a gas-turbine power plant. In each of these analyses, the focus is on identifying safety issues emanating from security scenarios.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The primary contribution of this work is to present an integrated safety and security model for an industrial control system application, that we call Cybersafety [6], based on the STAMP STPA-Sec method. While some authors have performed cybersecurity analyses using the STAMP framework in the past, we believe those are essentially safety analyses containing cybersecurity-related causal factors.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the information-oriented threat usually exploits some potential vulnerabilities of IT systems to invade and attack their primary components or function units, and reaches the ultimate destination to steal sensitive information or cause a system crash [8,9]. Differently, the process control-oriented threat represents the OT-related attacks whose primary target is to destroy the normal production process when one control system is running smoothly and orderly [10,11]. More precisely, this threat may invalidate the production process by forcibly inserting some abnormal control commands, or cause alarm failure or error warning by intentionally changing the alarm threshold [12,13].…”
Section: Introductionmentioning
confidence: 99%