<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Graph-based Framework for Integrated Security and Safety Analysis in Digital Production Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sebastian Kropatschek</string-name>
          <email>sebastian.kropatschek@acdp.at</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kabul Kurniawan</string-name>
          <email>kabul.kurniawan@wu.ac.at</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pusparaj Boshale</string-name>
          <email>pusparaj.boshale@tuwien.ac.at</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Siegfried Hollerer</string-name>
          <email>siegfried.hollerer@tuwien.ac.at</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elmar Kiesling</string-name>
          <email>elmar.kiesling@wu.ac.at</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dietmar Winkler</string-name>
          <email>dietmar.winkler@tuwien.ac.at</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Safety, Security, Knowledge Graph, Bayesian Network, CPPS</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Austrian Center for Digital Production (ACDP)</institution>
          ,
          <addr-line>Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>SBA Research</institution>
          ,
          <addr-line>Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>TU Wien, Institute of Computer Engineering</institution>
          ,
          <addr-line>Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>WU Wien, Institute for Data</institution>
          ,
          <addr-line>Process and Knowledge Management, Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <fpage>6</fpage>
      <lpage>10</lpage>
      <abstract>
        <p>The increasing interconnection of Information Technology and Operational Technology in Industry 4.0 creates new challenges and requires new approaches to ensure that production processes are executed safely and securely. Production system safety and security have therefore become critical aspects as security incidents can lead to serious problems such as production failure, equipment damage, or human injury. This paper introduces a knowledge-graph-based framework for safety and security analysis that integrates prior work on product, process, and resources (PPR) as well as cause-efect modeling. To identify possible attack chains and their impact on safety issues, we leverage Bayesian Belief Networks to estimate failure probabilities and propagate them through the knowledge graph. We evaluate our approach by means of a real-world manufacturing use-case.</p>
      </abstract>
      <kwd-group>
        <kwd>Digital</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Security in the production system domain is a critical aspect necessary to maintain reliability
and ensure safety during the production process [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. However, the convergence of Information
Technology (IT) and Operational Technology (OT) and their connection in production systems
have opened new attack vectors that make them more vulnerable to cyber-attacks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. IT
infrastructure can increasingly serve as the initial point of attack and cause production system
failures and safety issues (e.g., equipment/component damage and human injury).
      </p>
      <p>
        For example, a Safety Instrumented System (SIS) may be attacked via exploiting IT-based
vulnerabilities. As a result, the manipulated SIS cannot react when needed, or the execution
of its safety function occurs in the wrong timeframe. This situation may cause people to be
injured or harmed (e.g., while interacting with a machine) or damage the production facility or
CEUR
Workshop
Proceedings
plant. Furthermore, it is possible to trigger safety functions intentionally. As a consequence,
the attacked production line or machine line stops its operation, impacting the availability
negatively while causing economic damage [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Additionally, cyber-attacks may be launched
against user interfaces (e.g., web applications) controlling safety functions, potentially impacting
human safety over this attack vector when exploited [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. Therefore and based on the examples,
there is the need for a holistic view of safety and security.
      </p>
      <p>
        Keeping track of the production system state and recognizing such unexpected attacks is an
increasingly complex problem. This is due to the heterogeneous nature of resources and
components as well as the isolated design of functional safety and security in production systems [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Furthermore, diferent views of engineering experts (e.g., mechanical and automation experts)
increase the gap in safety and security coverage and consequently make security and safety
analysis increasingly dificult. Several approaches exist to address safety and security [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6, 7, 8</xref>
        ].
However, there is a need to develop a standardized approach, generic tools, and a framework that
efectively combines security and safety in a production system context while ofering flexibility
and feasibility [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In this paper, we therefore introduce a Knowledge Graph (KG)-based
framework for safety and security analysis in production system environments (cf.
Fig. 1). We build on prior work [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and develop a standards-based model based on an RDF/OWL
ontology to construct knowledge graphs ⃝ 1 ⃝ 2 . To analyze the generated KGs, we leverage
Bayesian Belief Networks (BBNs) [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] ⃝ 3 to identify possible failures and propagate them through
the KG ⃝ 4 ⃝ 5 .
      </p>
    </sec>
    <sec id="sec-3">
      <title>2. Our Approach</title>
      <p>
        In prior work [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], we introduced the PPR Model which establishes links between Product, Process,
Resource (PPR) in a production system environment and Failure Cause-Efect relationships.
The PPR model comprises three fundamental concepts in production environments and their
connections within a production network, i.e., (i) Products, such as input or output as resulting
from the production process, (ii) Processes, such as activities performed to accomplish a certain
task, and (iii) Resources, such as components utilized by the process to execute tasks. The
Cause-Efect network represents the existing knowledge of cause-efect relationships curated
by experts.
      </p>
      <p>
        Example Scenario. Fig. 2 depicts a Collaborative Robot (Cobot) Hazard scenario [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] represented
in a Cause-Efect-PPR Model . It involves the risk of a cyber-attack causing harm to humans
working with robots in a car part production environment. Therefore, the Products produced
in this scenario are car parts. The production systems involve several resources including OT
resources (e.g., cobot, force sensor, and a light-barrier), Control/IT resources (e.g, workstations
and a process engine/PLC) and Human resources such as operators and security engineers.
These resources perform tasks in the production Processes, such as ”unloading parts” (performed
by a cobot) and a ”human inspection” – which is carried out by the operator. Finally, the
Cause-Efect part of the model represents production knowledge pertaining to production and
security-related causes and efects.
      </p>
      <p>Safety and Security Issues. In our example scenario, a security incident occurs because the
attacker successfully compromises the workstation by uploading malicious software. It allows
the attacker to manipulate the Cobot Controller and change the collaborative mode to ”inactive”
while displaying a manipulated state message (”ON” mode). Given that the cobot controller is
connected to the cobot, this raises a high risk of an incident wherein the operator can be struck
by the cobot and sustain injuries.</p>
      <p>
        Model Conceptualization and KG-Construction. To represent the relevant Cause-Efect-PPR
knowledge, we developed an ontology based on RDF/OWL. To this end, we followed established
ontology engineering practices [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. We first conducted a survey of existing ontologies and
identified [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] as a candidate for cause-efect modeling and the VDI 3268 1 standard as a basis
for our PPR representations. Fig. 3 shows our integrated Cause-Efect-PPR ontology. To link
knowledge from these domains and coordinate investigations, we introduced a common general
concept, i.e., Characteristic, which defines characteristic values from both Cause-Efect and
PPR elements. It has a self-dependency link identified by the hasCharacteristic property and a
dependency link to the FailureMode concept. Due to space constraints, we do not explain the
full ontology in detail but refer the interested reader to the related documentation2. Listing 1
shows an excerpt of RDF instance constructed from the proposed ontology.
1VDI 3682: VDI guideline 3682: Formalised process descriptions (2005)
2Ontology Representation: http://w3id.org/acdp/onto/fpi
      </p>
      <p>Listing 1: an Excerpt of RDF instance.</p>
      <p>Listing 2: RDF Instance with BBN probability.
1 @prefix fpi : &lt;http://w3id.org/acdp/onto/fpi#&gt; .
2 @prefix : &lt;http://w3id.org/acdp/res#&gt; .
3 :PLC-1 a fpi:ControlResource, fpi:TechnicalResource;
4 fpi:hasCharacteric :OperatingMode;
5 fpi:hasFunctionalLink :Cobot-1.
6 :Cobot-1 a fpi:OperationalResource; ...
@prefix bbn : &lt;http://w3id.org/acdp/onto/bbn#&gt; .
@prefix : &lt;http://w3id.org/acdp/res#&gt; .
:PLC-1 a bbn:Node.
&lt;&lt; :PLC-1 bbn:fail true &gt;&gt; bbn:probability 0.7 .
&lt;&lt; :PLC-1 bbn:fail false &gt;&gt; bbn:probability 0.3 .
:Cobot-1 a bbn:Node; ...</p>
      <p>
        KG-based Bayesian Belief Network (BBN) propagation. BBNs are probabilistic models that
represent and analyze relationships between variables through conditional probability
distributions. They have been investigated extensively in academia and adopted in industry as a method
to tackle safety and security challenges in manufacturing [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. We propose to combine KGs’
ability to represent safety- and security-relevant domain knowledge with the ability of BBNs to
capture probabilistic relationships. By propagating probability information throughout the KG
structure, we leverage BBNs for probabilistic reasoning in knowledge graphs. Integrating BBNs
into KGs ofers several advantages: (i) By making BBNs queryable, they can be enriched and
contextualized with domain knowledge from the KG, (ii) BBNs enhance KGs by providing advanced
probabilistic reasoning and inference capabilities. In this context, BBNs can support a KG in
analyzing the potential impact of safety and security issues, and finding root causes. Listing 2 depicts
an example of such a BBN-KG integration. Here, the probability of :PLC-1 failing is
quantiifed through RDF-star statement as &lt;&lt; :PLC-1 bbn:fail true &gt;&gt; bbn:probability 0.7 .
Throughout the KG network, these probability scores are propagated.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. Preliminary Evaluation and Conclusions</title>
      <p>Use-Case Evaluation. Following the scenario described in Section 2, an analyst may
need to identify the root cause of a safety incident. Our approach enables the
analyst to start the root cause analysis by formulating a SPARQL query as shown in
Listing 3. The query traces backward through the KG via ^fpo:hasFunctionalLink*
starting from the identified Operator Health Hazard. To find relevant node chains
associated with the safety issue, a filter can be applied to trace back and filter the desired
nodes with high probability, e.g., &lt;&lt; ?o bbn:fail true &gt;&gt; bbn:probability ?val2. and
filter (?val &gt;= 0.5 \&amp;\&amp; ?val2 &gt;=0.5). Fig. 4 shows a sub-graph representing the
identified and selected nodes chaining associated with the safety incident (note that diferent node
colors show diferent types of resources). It shows that an attacker managed to bypass the
corporate firewall ⃝ 1 and launch malicious software that compromised the cobot programming
software on the workstation ⃝ 2 . From there, the attacker gains access to the cobot ⃝ 3 via a
switch connected to PLC and manipulates them ⃝ 4 .</p>
      <p>Conclusion and Outlook. In this paper, we introduce a method that represents, constructs and
analyzes safety and security in production systems by means of a KG and BBN method. The
evaluation result shows high practical relevance as the proposed approach efectively performs
safety and security analysis. For future work, we plan to evaluate our approach in a real-world
setting and link the identified attack to the existing attack pattern.</p>
      <p>Listing 3: SPARQL Query - Backward Search.
1 PREFIX bbn: &lt;http://w3id.org/acdp/onto/bbn#&gt; .
2 PREFIX fpi: &lt;http://w3id.org/acdp/onto/fpi#&gt; .
3 PREFIX : &lt;http://w3id.org/acdp/res#&gt; .
4 CONSTRUCT {?s ?p ?o}
5 WHERE {:Operator ^fpi:hasFunctionalLink* ?o.
6 ?s ?p ?o.
7 &lt;&lt; ?s bbn:fail true &gt;&gt; bbn:probability ?val.
8 &lt;&lt; ?o bbn:fail true &gt;&gt; bbn:probability ?val2.
9 FILTER (?val &gt;= 0.5 &amp;&amp; ?val2 &gt;=0.5)}</p>
      <p>Acknowledgements. The financial support by the Christian Doppler Research Association,
the Austrian Federal Ministry for Digital and Economic Afairs and the National Foundation
for Research, Technology and Development is gratefully acknowledged. This work has been
partially supported and funded by the Austrian Research Promotion Agency (FFG) via the
Austrian Competence Center for Digital Production (CDP) under the contract number 881843
and SBA Research. This work has also received funding from the Teaming.AI project in the
European Union’s Horizon 2020 research and innovation program under grant agreement No
95740.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ustundag</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Cevikcan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Ervural</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ervural</surname>
          </string-name>
          ,
          <article-title>Overview of cyber security in the industry 4.0 era, Industry 4.0: managing the digital transformation (</article-title>
          <year>2018</year>
          )
          <fpage>267</fpage>
          -
          <lpage>284</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>M. M. Alani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Alloghani</surname>
          </string-name>
          ,
          <article-title>Security challenges in the industry 4.0 era, Industry 4.0 and engineering for a sustainable future (</article-title>
          <year>2019</year>
          )
          <fpage>117</fpage>
          -
          <lpage>136</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Jin-woo Myung</surname>
          </string-name>
          ;
          <article-title>Sunghyuck Hong, ICS malware Triton attack and countermeasures</article-title>
          ., in:
          <source>International Journal of Emerging Multidisciplinary Research</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wolf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Serpanos</surname>
          </string-name>
          ,
          <article-title>Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems</article-title>
          ,
          <source>Proceedings of the IEEE</source>
          <volume>106</volume>
          (
          <year>2018</year>
          )
          <fpage>9</fpage>
          -
          <lpage>20</lpage>
          . doi:
          <volume>10</volume>
          .1109/JPROC.
          <year>2017</year>
          .
          <volume>2781198</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hollerer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Fischer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Brenner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Papa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schlund</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Kastner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fabini</surname>
          </string-name>
          , T. Zseby,
          <article-title>Cobot attack: a security assessment exemplified by a specific collaborative robot</article-title>
          ,
          <source>Procedia Manufacturing</source>
          <volume>54</volume>
          (
          <year>2021</year>
          )
          <fpage>191</fpage>
          -
          <lpage>196</lpage>
          . doi:https://doi.org/10.1016/j.promfg.
          <year>2021</year>
          .
          <volume>07</volume>
          .029.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Pirbhulal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gkioulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Katsikas</surname>
          </string-name>
          ,
          <article-title>Towards integration of security and safety measures for critical infrastructures based on bayesian networks and graph theory: A systematic literature review</article-title>
          ,
          <source>Signals</source>
          <volume>2</volume>
          (
          <year>2021</year>
          )
          <fpage>771</fpage>
          -
          <lpage>802</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kropatschek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hollerer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Hofman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Winkler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Luder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Sauter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Kastner</surname>
          </string-name>
          , S. Bifl,
          <article-title>Combining Models for Safety and Security Concerns in Automating Digital Production</article-title>
          , in: 2023 INDIN,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kurniawan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ekelhart</surname>
          </string-name>
          , E. Kiesling,
          <string-name>
            <given-names>G.</given-names>
            <surname>Quirchmayr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Tjoa</surname>
          </string-name>
          ,
          <article-title>Krystal: Knowledge graph-based framework for tactical attack discovery in audit data</article-title>
          ,
          <source>Computers &amp; Security</source>
          <volume>121</volume>
          (
          <year>2022</year>
          )
          <fpage>102828</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>N. F.</given-names>
            <surname>Noy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. L.</given-names>
            <surname>McGuinness</surname>
          </string-name>
          , et al.,
          <article-title>Ontology development 101: A guide to creating your first ontology</article-title>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Rehman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. V.</given-names>
            <surname>Kifor</surname>
          </string-name>
          ,
          <article-title>An ontology to support semantic management of fmea knowledge</article-title>
          ,
          <source>International Journal of Computers Communications &amp; Control</source>
          <volume>11</volume>
          (
          <year>2016</year>
          )
          <fpage>507</fpage>
          -
          <lpage>521</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>