| Literature DB >> 35408212 |
Xudong Ji1, Hongxing Wei1, Youdong Chen1, Xiao-Fang Ji1, Guo Wu1.
Abstract
Industrial control systems (ICS) are applied in many fields. Due to the development of cloud computing, artificial intelligence, and big data analysis inducing more cyberattacks, ICS always suffers from the risks. If the risks occur during system operations, corporate capital is endangered. It is crucial to assess the security of ICS dynamically. This paper proposes a dynamic assessment framework for industrial control system security (DAF-ICSS) based on machine learning and takes an industrial robot system as an example. The framework conducts security assessment from qualitative and quantitative perspectives, combining three assessment phases: static identification, dynamic monitoring, and security assessment. During the evaluation, we propose a weighted Hidden Markov Model (W-HMM) to dynamically establish the system's security model with the algorithm of Baum-Welch. To verify the effectiveness of DAF-ICSS, we have compared it with two assessment methods to assess industrial robot security. The comparison result shows that the proposed DAF-ICSS can provide a more accurate assessment. The assessment reflects the system's security state in a timely and intuitive manner. In addition, it can be used to analyze the security impact caused by the unknown types of ICS attacks since it infers the security state based on the explicit state of the system.Entities:
Keywords: dynamic assessment; industrial control systems; security; weighted hidden Markov model
Mesh:
Year: 2022 PMID: 35408212 PMCID: PMC9002662 DOI: 10.3390/s22072593
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The basic value decomposition diagram.
Quantitative table of asset status.
| State | Description | Valuation |
|---|---|---|
| Self-state | No-fault, available |
|
| Fault-fixed, warning |
| |
| Fault but not affecting the main function, dangerous |
| |
| Network state | Network bandwidth utilization |
|
| Network bandwidth utilization | 1 | |
| Network bandwidth utilization |
| |
| Work environment | Temperature normal, Humidity drying, Weak |
|
| One item is out of rating |
|
Figure 2The processes of the attack path model.
Figure 3Hierarchy diagram of the vulnerability of ICS.
The valuation of availability.
| Description | Valuation | |
|---|---|---|
| Vector | Remote |
|
| Neighbor |
| |
| Local |
| |
| Port physical connection |
| |
| Complexity | Primary |
|
| Secondary |
| |
| Senior |
| |
| Authentication | Repeatedly |
|
| Single |
| |
| None |
|
Data weakness valuation value.
| Description | Valuation | |
|---|---|---|
| Usability | Process parameters viewing commands |
|
| System parameters viewing commands |
| |
| All parameters viewing commands |
| |
| Process parameters editing commands |
| |
| System parameters editing commands |
| |
| All parameters editing commands | 1 | |
| Integrity | Syntax verification audit |
|
| Pre and post content verification audit |
| |
| Hazard verification audit |
| |
| Confidentiality | Encryption |
|
| Unencrypted, nonstandard |
| |
| Unencrypted, standard |
|
Safety protection value.
| Description | Valuation | |
|---|---|---|
| Code patch | All | 0.1 |
| Part | 0.4 | |
| None | 0.7 | |
| Normal protective | More than two | 0.2 |
| One or two | 0.6 | |
| None | 0.9 | |
| Emergency protective | Soft response (without damaging the | 0.3 |
| Hard reaction (equipment May be | 0.5 | |
| None | 0.8 |
Figure 4The W-HMM model.
Figure 5The analysis diagram of security and system fault.
Example of system faults.
| System Faults | Identifier | Example |
|---|---|---|
| Normal |
| / |
| Error |
| Program syntax error, |
| Mild alarm |
| The planning path may exceed |
| Warning |
| System acceleration approaching the |
| Moderate alarm |
| Speed exceeds the threshold during running, |
| Serious alarm |
| The system detects motor overcurrent, |
State weight value.
| Weight | |
|---|---|
|
| 0.5 |
|
| 1 |
|
| 2 |
|
| 2.5 |
|
| 4 |
Type of parameters.
| Type | Identifier | Description |
|---|---|---|
| Constant |
| It only needs to be collected once |
|
| ||
|
| ||
|
| ||
| Stage constant |
| Regular collection and |
|
| ||
|
| ||
| Real-time volume |
| Real-time acquisition and calculation |
|
| ||
|
|
Figure 6Security evaluation framework of DAF-ICSS.
Figure 7Risk map.
Figure 8The topography of the system.
Basic value datasheet of the robot unit.
| Property | Name | Identifier | Valuation | Remarks |
|---|---|---|---|---|
| Self-value | Controller, sensors and accessories, etc. | / | CNY 40,000 | Collection of financial information |
| Indirect value | Labor, equipment, product lost, etc, | / | CNY 160,000 | |
| Accident value | Accident probability |
| 0.01 | Statistics |
| Accident loss |
| CNY 1,000,000 | ||
| Asset status | Self-state |
| 0.25 | Query the above |
| Network state |
| 1.5 | ||
| Work environment |
| 0.8 |
Control system information sheet.
| Property | Name | Identifier | Valuation | Remarks |
|---|---|---|---|---|
| Availability | Vector |
| 0.55 | Check the |
| Complexity |
| 0.61 | ||
| Authentication |
| 0.704 | ||
| Data weakness | Usability |
| 0.5 | |
| Integrity |
| 0.7 | ||
| Confidentiality |
| 0.5 | ||
| Safety | Code patch |
| 0.7 | |
| Normal protective measure |
| 0.9 | ||
| Emergency protective measure |
| 0.5 |
The data of the observation sequence.
| Stage 1 | ||||
|---|---|---|---|---|
| Day | Observation sequence | Expert (CNY | HMM (CNY | DAF-ICSS (CNY |
| Day 1 |
| 1.75649 | 1.7498 | |
| Day 2 |
| 2.17419 | 2.51482 | |
| Day 3 |
| 2.27618 | 2.79187 | |
| Day 4 |
| 1.60 | 2.0854 | 2.72481 |
| Day 5 |
| 2.04967 | 2.66117 | |
| Day 6 |
| 2.13676 | 2.86088 | |
| Day 7 |
| 2.2158 | 2.92729 | |
|
| ||||
| Day 1 |
| 2.23394 | 4.0062 | |
| Day 2 |
| 2.24704 | 3.17175 | |
| Day 3 |
| 2.4923 | 3.23129 | |
| Day 4 |
| 2.10 | 2.47547 | 3.08055 |
| Day 5 |
| 2.52337 | 3.1867 | |
| Day 6 |
| 2.72174 | 3.32432 | |
| Day 7 |
| 2.68091 | 3.28233 | |
Figure 9The result of the experiment.
The comparison of some security assessment methods in performance.
| Method | Qualitative or Quantitative | Accuracy | Static or Dynamic | Evaluate Unknown Attacks |
|---|---|---|---|---|
| Expert | Qualitative | High accuracy | Static | Y |
| Fault tree | Qualitative | Medium accuracy | Static | N |
| Bayesian network | Quantitative | Medium accuracy | Static | N |
| HMM | Combination | Medium accuracy | Dynamic | Y |
| DAF-ICSS | Combination | High accuracy | Dynamic | Y |