Skip to main content
Log in

A logic-based framework for the security analysis of Industrial Control Systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Industrial Control Systems (ICS) are used for monitoring and controlling critical infrastructures such as power stations, waste water treatment facilities, traffic lights, and many more. Lately, these systems have become a popular target for cyber-attacks. Security is often an afterthought, leaving them vulnerable to all sorts of attacks. This article presents a formal approach for analysing the security of Industrial Control Systems, both during their design phase and while operational. A knowledge- based system is used to analyse a model of the control system and extract system vulnerabilities. The approach has been validated on an ICS in the design phase.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abrams, M. and Weiss, J., Malicious Control System Cyber Security Attack Case Study, Maroochy Water Services, Australia, 2008.

    Google Scholar 

  2. Tinuade, A., The State of Industrial Control Systems Security and National Critical Infrastructure Protection: Emerging Threats, 2012.

    Google Scholar 

  3. ANSI/ISA-62443-3-3 (99.03.03)-2013 Security for Industrial Automation and Control Systems Part 3-3: System Security Requirements and Security Levels, 2013.

  4. Bogaerts, B., De Cat, B., De Pooter, S., and Denecker, M., The IDP Framework Reference Manual, 2012.

    Google Scholar 

  5. Byres, E., Karsch, J., and Carter, J., NISCC Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, National Infrastructure Security Co-Ordination Centre, 2005.

    Google Scholar 

  6. Centre for Protection of National Infrastructure. Manage Industrial Control Systems Lifecycle: A Good Practice Guide, 2015. https://www.cpni.gov.uk/Documents/Publications/2015/12-May-2015-3.%20Manage%20 ICS%20Lifecycle%20Final %20v1.0.pdf.

  7. Friedenthal, S., Moore, A., and Steiner, R., A Practical Guide to SysML: The Systems Modeling Language, Morgan Kaufmann, 2014.

    Google Scholar 

  8. Galloway, B. and Hancke, G.P., Introduction to industrial control networks, IEEE Commun. Surv. Tutorials, 2013, vol. 15, no. 2, pp. 860–880.

    Article  Google Scholar 

  9. Huang, E., Ramamurthy, R., and McGinnis, L.F., System and simulation modeling using SysML, Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come, 2007, pp. 796–803.

    Google Scholar 

  10. ISO/IEC 21827: Information Technology—Security Techniques—Systems Security Engineering—Capability Maturity Model (SSE-CMM), 2008.

  11. Langner, R., To Kill a Centrifuge: A Technical Analysis of What Stuxnet’s Creators Tried to Achieve, 2013.

    Google Scholar 

  12. Lemaire, L., Lapon, J., De Decker, B., and Naessens, V., A SysML extension for security analysis of industrial control systems, Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research, 2014, p. 1.

    Google Scholar 

  13. Lemaire, L., Vossaert, J., Jansen, J., and Naessens, V., Extracting vulnerabilities in industrial control systems using a knowledge-based system, Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research, 2015, p. 1.

    Chapter  Google Scholar 

  14. Matrosov, A., Rodionov, E., and Harley, D., Stuxnet Under the Microscope, 2011.

    Google Scholar 

  15. Oates, R., Thom, F., and Herries, G., Security-aware, model-based systems engineering with SysML, Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research, 2013, pp. 78–87.

    Google Scholar 

  16. Stouffer, K., Lightman, S., Pillitteri, V., Abrams, M., and Hahn, A., Guide to Industrial Control Systems (ICS) Security, 2015.

    Book  Google Scholar 

  17. Wittocx, J., Mariën, M., and Denecker, M., The IDP system: A model expansion system for an extension of classical logic, Proceedings of the 2nd Workshop on Logic and Search, 2008, pp. 153–165.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laurens Lemaire.

Additional information

The article is published in the original.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lemaire, L., Vossaert, J., Jansen, J. et al. A logic-based framework for the security analysis of Industrial Control Systems. Aut. Control Comp. Sci. 51, 114–123 (2017). https://doi.org/10.3103/S0146411617020055

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411617020055

Keywords

Navigation