• DocumentCode
    3062060
  • Title

    A Workflow-Based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment

  • Author

    Xiao, Kun ; Chen, Nianen ; Ren, Shangping ; Shen, Limin ; Sun, Xianhe ; Kwiat, Kevin ; Macalik, Michael

  • Author_Institution
    Illinois Inst. of Technol., Chicago
  • fYear
    2007
  • fDate
    20-26 May 2007
  • Firstpage
    4
  • Lastpage
    4
  • Abstract
    The focus of this paper is on vulnerabilities which exist in supervisory control and data acquisition (SCADA) systems. Cyber attacks targeting weaknesses in these systems can seriously degrade the survivability of a critical system. Detailed here is a non-intrusive approach for improving the survivability of these systems without interruption of their normal process flow. In a typical SCADA system, unsafe conditions are avoided by including interlocking logic code on the base system. This prevents conflicting operations from starting at inappropriate times, and provides corrective action or graceful shut-down of the system when a potentially unsafe condition is detected. If this code or these physical devices are manipulated remotely, the system can fail with unpredictable results. In the proposed approach, a workflow is constructed on a system outside of the attack path and separate from the process under control. The workflow is a combination of the functional behavior of a SCADA system and a model generated by cyber attack scenarios in that system. A cause and effect relationship of commands processed by the SCADA system is simulated in the workflow to help detect malicious operations. The workflow then contain functional and survivability knowledge of the underlying system. Failures induced by the introduction of malicious logic will be predicted by simulating the fault in the workflow. Modeling these modes of failure will be valuable in implementing damage control. This model is event driven and conducts simulation externally, hence does not interfere with normal functionality of the underlying systems.
  • Keywords
    SCADA systems; reliability; workflow management software; critical infrastructures survivability; cyber environment; fault simulation; interlocking logic code; malicious logic; supervisory control and data acquisition systems; workflow-based nonintrusive approach; Computer science; Control systems; Degradation; Fault tolerant systems; Hardware; Physical layer; Process control; Protection; SCADA systems; Sun;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Engineering for Secure Systems, 2007. SESS '07: ICSE Workshops 2007. Third International Workshop on
  • Conference_Location
    Minneapolis, MN
  • Print_ISBN
    0-7695-2952-6
  • Type

    conf

  • DOI
    10.1109/SESS.2007.3
  • Filename
    4273330