A Framework for Threat-driven Cyber Security Verification of IoT Systems

被引:11
|
作者
Kulik, Tomas [1 ]
Tran-Jorgensen, Peter W. V. [1 ]
Boudjadar, Jalil [1 ]
Schultz, Carl [1 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
关键词
PHYSICAL SYSTEMS;
D O I
10.1109/ICSTW.2018.00033
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Industrial control systems are changing from monolithic to distributed and interconnected architectures, entering the era of industrial IoT. One fundamental issue is that security properties of such distributed control systems are typically only verified empirically, during development and after system deployment. We propose a novel modelling framework for the security verification of distributed industrial control systems, with the goal of moving towards early design stage formal verification. In our framework we model industrial IoT infrastructures, attack patterns, and mitigation strategies for countering attacks. We conduct model checking-based formal analysis of system security through scenario execution, where the analysed system is exposed to attacks and implement mitigation strategies. We study the applicability of our framework for large systems using a scalability analysis.
引用
收藏
页码:89 / 97
页数:9
相关论文
共 50 条
  • [41] A Framework of Cyber-Security Protection for Warship Systems
    Lv Yunfei
    Chen Yuanbao
    Wang Xuan
    Li Xuan
    Zhang Qi
    PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, : 17 - 20
  • [42] Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security
    Zimba, Aaron
    Wang, Zhaoshun
    Mulenga, Mwenge
    Odongo, Nickson Herbert
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2020, 60 (04) : 297 - 308
  • [43] CYBER ATTACKS - UNPRECEDENTED THREAT TO SECURITY
    Repez, Filofteia
    Deaconu, Gheorghe
    PROCEEDINGS INTERNATIONAL CONFERENCE MILITARY SCIENCE UNIVERSE, SELECTED PAPERS, 2011, : 446 - 450
  • [44] SmartSentry: Cyber Threat Intelligence in Industrial IoT
    Sadhwani, Sapna
    Modi, Urvi Kavan
    Muthalagu, Raja
    Pawar, Pranav M.
    IEEE ACCESS, 2024, 12 : 34720 - 34740
  • [45] CTIoT: A Cyber Threat Intelligence Tool for IoT
    El Jaouhari, Saad
    Ahmed, Shaikh
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1483 - 1489
  • [46] A Predictive Runtime Verification Framework for Cyber-Physical Systems
    Yu, Kang
    Chen, Zhenbang
    Dong, Wei
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 223 - 227
  • [47] A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks
    Li, Jing
    Yin, Lihua
    Guo, Yunchuan
    Li, Chao
    Li, Fenghua
    Chen, Lihua
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 486 - 496
  • [48] Threat-driven Resource Allocation Algorithm for Distributed Netted Phased Array Radars
    Song X.
    Li Z.
    Ren H.
    Yi W.
    Journal of Radars, 2023, 12 (03) : 629 - 641
  • [49] Cyber security threats in IoT: A review
    Rana, Pragati
    Patil, B. P.
    JOURNAL OF HIGH SPEED NETWORKS, 2023, 29 (02) : 105 - 120
  • [50] Simulation-based framework for authenticating SCADA systems and cyber threat security in edge-based autonomous environments
    Mughaid, Ala
    Alzu'bi, Shadi
    Alkhatib, Ahmad A. A.
    Alzioud, Adel
    Al Ghazo, Alaa
    AL-Aiash, Issa
    SIMULATION MODELLING PRACTICE AND THEORY, 2025, 140