<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An Architecture for the Analysis and Management of Security in Industrial Control Systems.</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Laurens Lemaire</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jorn Lapon</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vincent Naessens</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>KU Leuven, Department of Industrial Engineering Gebroeders Desmetstraat 1</institution>
          ,
          <addr-line>9000 Ghent</addr-line>
          ,
          <country country="BE">Belgium</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The security of Industrial Control Systems (ICS) has become an important topic. Attacks such as the Stuxnet worm have shown that inadequately protecting control systems could have disastrous consequences for society. Our research focuses on the creation of a tool that aims to enhance the security of Industrial Control Systems. It will be possible for system owners and operators to model their control systems in our tool. Using formal methodologies, the tool can extract a list of vulnerabilities in the system. Users can reason about the e ects on system security of component changes or newly discovered vulnerabilities.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Industrial Control Systems (ICS) are used for managing industrial processes.
These systems are responsible for controlling and regulating a large number of
processes such as the distribution of gas and electricity, following up nuclear
reactors, or managing tra c lights. In the last decades, ICS have seen many
changes. In the past they were isolated, proprietary systems. Now they mostly
use commercial o -the-shelf components, integrated with back-end systems that
are often connected to corporate networks and the internet.</p>
      <p>
        This evolution has made ICS easier to use. At the same time it has weakened
the security and exposed the systems to remote attacks. To make things worse,
ICS are rather static and use components and technologies that are quickly
outdated with regards to security. Several attacks on ICS systems have made
the news in recent years. The most known example is Stuxnet [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ], a worm that
infected a nuclear plant in Iran, and severely slowed down the nuclear program of
the country [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Other notable ICS incidents include the Slammer worm disabling
the David-Besse nuclear power plant in Ohio [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], the Maroochy Shire sewage spill
in Australia [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], and discovery of worms and Trojan backdoors like Duqu [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and
Night Dragon [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] that gather information about control systems to make future
attacks like Stuxnet possible.
      </p>
      <p>
        Attacks on these systems can be very damaging for society. A lot of attention
has been given to ICS security, and governments are aware that new security
measures must be taken. This can be done from various angles: public awareness,
laws, technology, etc. Organisations such as ISA, NIST, and ISO are de ning
standards regarding security in industrial control systems [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Aims and Objectives</title>
      <p>The objective of this research is to create a tool for the analysis of security in ICS.
We develop a new approach to automatically draw conclusions regarding system
security. It is also possible to generate suggestions that provide decision support.
Important considerations during this research are: e ciency and exibility of the
architecture, quality of the achieved results, and practical usability.</p>
      <p>We aim to develop a model that takes into account the speci c requirements
of ICS. Existing models for IT systems cannot be used since ICS have di erent
architecture and security properties (Con dentiality, Integrity, Availability in
IT versus Safety, Reliability, Availability in ICS). Attackers of ICS can range
from disgruntled employees to governments, our attacker model should be able
to capture them all.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Contributions to State-of-the-Art</title>
      <p>
        Tools for modelling control systems or assessing their security have been
developed. Homeland Security has created CSET, the Cyber Security Evaluation Tool
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. CSET checks compliance of a system with a chosen security standard through
a question and answer method. It does not provide an architectural analysis, and
it also does not allow the user to reason about compromised components and
their e ects on system security, which our tool does.
      </p>
      <p>
        The KTH in Stockholm has developed CySeMoL, the Cyber Security
Modelling Language [
        <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
        ]. This tool estimates the probability that attacks succeed
against an enterprise system. It does not suggest system improvements to reduce
this probability, or point out the weaknesses that make the attacks possible. It
allows users to change their system architecture and view the resulting changes
on the attack probabilities, but only the attacks de ned by the tool designers are
considered. CySeMoL has to be updated when new attacks are discovered. In our
tool, when new vulnerabilities are discovered, it su ces to change the security
properties of the a ected components in the system model. This can be done by
the user and does not require the program to be updated. For computing the
attack probabilities, CySeMoL assumes that the attacker is a penetration tester
who only has access to public tools, and only tries to attack the system for one
week. Previous ICS incidents like Stuxnet have shown that attackers are much
more powerful. Our attacker model will re ect this.
      </p>
      <p>
        ValueSec has redesigned Lancelot [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], a tool previously used for security
evaluation of ICT systems in the nancial sector. It is now a risk management
platform that enables users to analyse security risks and their business
implications for the energy smart grid and SCADA (Supervisory Control And Data
Acquisition) environment. SCADA systems are a subset of ICS [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Lancelot
asks a user to de ne the system's assets and to associate risk pro les to them.
It then does a security analysis to detect risks and compliance issues, and
prepares mitigation plans to deal with the risks that are found. Risk in Lancelot
is de ned as \the potential damage that can be caused when something goes
wrong with an asset or when someone/something takes advantage of an asset's
vulnerabilities". It is assumed that the user of the program already has
knowledge of the vulnerabilities in his system. Lancelot does not help with identifying
vulnerabilities.
      </p>
      <p>
        There are several other tools to conduct risk assessment, but they also assume
that the vulnerabilities are already known [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Risk assessment methods usually
start with a meeting between the risk assessment team and the system engineers
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. During this meeting they brainstorm about possible vulnerabilities that
the system could have. Our tool provides an automation of this phase and the
results could hence be used as input for a risk assessment method. When using
our tool, a system engineer only has to enter the system architecture, assign the
relevant security properties to components, and the vulnerabilities are extracted
automatically.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Research Methodology</title>
      <p>The rst months of the project were dedicated to a literature study about the
current situation in Industrial Control Systems. Research was done on current
modelling techniques, standards and guidelines related to ICS security, ICS
architectures, etc.</p>
      <p>
        The next step was to create a rst model and test it on a simpli ed ICS. The
systems are modelled using the Inductive De nition Programming framework
(IDP) [
        <xref ref-type="bibr" rid="ref15 ref16">15,16</xref>
        ]. A control system is entered as a network of components to which
security properties are assigned. A logic-based theory using induction rules then
allows the tool to automatically infer vulnerabilities and corresponding attacks
that could occur in this system. Changing the security properties allows users to
reason about scenarios in which attackers have breached or compromised certain
components. It is also possible to model the consequences of system changes,
newly discovered bugs, applied patches, etc.
      </p>
      <p>This initial model was tested on a wind turbine case study. The results have
been submitted to a conference as a rst paper.</p>
      <p>The model will be reworked to include an attacker model and distinguish
between vulnerabilities and attacks. New functionalities to improve ICS security
will be added to the tool, for instance decision support allowing the user to
give a desired security property and presenting him with the optimal component
con guration to achieve this. Input and output handling for the tool will be
improved upon. Ways to automatically add ICS-CERT vulnerabilities posted
on the website into the tool's logic theory will be explored. The result of the
vulnerability extraction will be compatible with risk management tools such as
CORAS.</p>
      <p>Lastly, the model will be tested on multiple case studies.</p>
    </sec>
    <sec id="sec-5">
      <title>Contributions to the</title>
    </sec>
    <sec id="sec-6">
      <title>Software and Systems eld of Engineering Secure</title>
      <p>Our research involves analysing the security in Industrial Control Systems. An
important aspect of engineering secure systems is the veri cation of such systems.
This is where our tool can help. When a new component for ICS is developed
with certain security properties, our tool can model a complete system to assess
the impact of this component on system security.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.</given-names>
            <surname>Matrosov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Rodionov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Harley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Malcho</surname>
          </string-name>
          .
          <article-title>Stuxnet Under the Microscope</article-title>
          .
          <source>ESET</source>
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>N.</given-names>
            <surname>Falliere</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. O.</given-names>
            <surname>Murchu</surname>
          </string-name>
          , E. Chien.
          <source>W32.Stuxnet Dossier Version 1</source>
          .4. Online: http://www.symantec.com/content/en/us/enterprise/media/security_ response/whitepapers/w32_stuxnet_dossier.pdf,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>R.</given-names>
            <surname>Langner</surname>
          </string-name>
          .
          <article-title>To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve</article-title>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>K.</given-names>
            <surname>Poulsen</surname>
          </string-name>
          .
          <article-title>Slammer worm crashed Ohio nuke plant network</article-title>
          .
          <source>Online:</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>M.</given-names>
            <surname>Abrams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Weiss. Malicious Control System Cyber Security Attack Case Study - Maroochy Water</surname>
          </string-name>
          <string-name>
            <surname>Services</surname>
          </string-name>
          ,
          <source>Australia. IFIP</source>
          , Volume
          <volume>253</volume>
          ,
          <string-name>
            <surname>Critical</surname>
            <given-names>Infrastructure Protection</given-names>
          </string-name>
          ,
          <year>2008</year>
          . http://www.securityfocus.com/news/6767,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Symantec</surname>
          </string-name>
          . W32.
          <article-title>Duqu: The precursor to the next Stuxnet</article-title>
          . Online: http://www.symantec.com/content/en/us/enterprise/media/security_ response/whitepapers/w32_
          <article-title>duqu_the_precursor_to_the_next_stuxnet</article-title>
          .pdf,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>McAfee</surname>
          </string-name>
          .
          <source>Global Energy Cyberattacks: \Night Dragon"</source>
          .
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>K.</given-names>
            <surname>Stou er</surname>
          </string-name>
          , J. Falco,
          <string-name>
            <given-names>K.</given-names>
            <surname>Scarfone</surname>
          </string-name>
          .
          <article-title>Guide to Industrial Control Systems (ICS) Security</article-title>
          .
          <source>NIST Special Publication 800-82</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Homeland</given-names>
            <surname>Security</surname>
          </string-name>
          .
          <article-title>Cyber Security Evaluation Tool (CSET): Performing a SelfAssessment</article-title>
          . http://ics-cert.
          <article-title>us-cert</article-title>
          .gov/Assessments.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. T. Sommestad,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ekstedt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Holm</surname>
          </string-name>
          .
          <article-title>The Cyber Security Modeling Language: A Tool for Vulnerability Assessments of Enterprise System Architectures</article-title>
          .
          <source>IEEE Systems Journal</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. T. Sommestad,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ekstedt</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          <article-title>Nordstrom. A case study applying the Cyber Security Modeling Language</article-title>
          .
          <source>CIGRE</source>
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>J. M. Prez</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Machnicki</surname>
          </string-name>
          .
          <source>ValueSec D5</source>
          .
          <article-title>3 - Description of developed tools and data</article-title>
          .
          <source>ValueSec</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>G. A.</given-names>
            <surname>Francia</surname>
          </string-name>
          , III,
          <string-name>
            <given-names>D.</given-names>
            <surname>Thornton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Dawson</surname>
          </string-name>
          .
          <article-title>Security Best Practices and Risk Assessment of SCADA and Industrial Control Systems</article-title>
          .
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <article-title>The CORAS Method</article-title>
          .
          <article-title>Online: coras</article-title>
          .sourceforge.net.
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>J. Wittockx</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Marien, M. Denecker. The IDP system: a model expansion system for an extension of classical logic</article-title>
          .
          <source>LaSh'08</source>
          ,
          <string-name>
            <surname>Leuven</surname>
          </string-name>
          , Belgium,
          <year>November 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>J. Wittockx</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Marien. The IDP system</article-title>
          . Online: http://www.cs.kuleuven.be/- dtai/krr/software/idpmanual.pdf,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>