Skip to main content

Generation of Applicative Attacks Scenarios Against Industrial Systems

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10723))

Included in the following conference series:

Abstract

In the context of security, risk analyzes are widely recognized as essential. However, such analyzes need to be replayed frequently to take into account new vulnerabilities, new protections, etc. As exploits can now easily be found on internet, allowing a wide range of possible intruders with various capacities, motivations and resources. In particular in the case of industrial control systems (also called SCADA) that interact with the physical world, any breach can lead to disasters for humans and the environment. Alongside of classical security properties such as secrecy or authentication, SCADA must ensure safety properties relative to the industrial process they control. In this paper, we propose an approach to assess the security of industrial systems. This approach aims to find applicative attacks taking into account various parameters such as the behavior of the process, the safety properties that must be ensured. We also model the possible positions and capacities of attackers allowing a precise control of these attackers. We instrument our approach using the well known model-checker UPPAAL, we apply it on a case study and show how variations of properties, network topologies, and attacker models can drastically change the obtained results.

This work has been partially funded by the SACADE (ANR-16-ASTR-0023) project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/jseidl/virtuaplant.

  2. 2.

    In UPPAAL, messages are not exchanged directly on channels. Instead signals are sent telling processes to access messages as global variables.

  3. 3.

    This models the actual behavior of the client in VirtualPlant and is not a limitation of our approach.

References

  1. Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)

    Article  Google Scholar 

  2. Lee, R.M., Assante, M.J., Conway, T.: German steel mill cyber attack. Industrial Control Systems, 30 (2014)

    Google Scholar 

  3. Lee, R.M., Assante, M.J., Conway, T.: Analysis of the cyber attack on the Ukrainian power grid. SANS Industrial Control Systems (2016)

    Google Scholar 

  4. Puys, M., Potet, M.-L., Lafourcade, P.: Formal analysis of security properties on the OPC-UA SCADA protocol. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9922, pp. 67–75. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45477-1_6

    Chapter  Google Scholar 

  5. Dreier, J., Puys, M., Potet, M.-L., Lafourcade, P., Roch, J.-L.: Formally verifying flow integrity properties in industrial systems. In: SECRYPT 2017–14th International Conference on Security and Cryptography, Madrid, Spain, p. 12, July 2017

    Google Scholar 

  6. Byres, E.J., Franz, M., Miller, D.: The use of attack trees in assessing vulnerabilities in SCADA systems. In: Proceedings of the International Infrastructure Survivability Workshop (2004)

    Google Scholar 

  7. Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., Stoddart, K.: A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56, 1–27 (2015)

    Article  Google Scholar 

  8. Piètre-Cambacédès, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliab. Eng. Syst. Saf. 110, 110–126 (2013)

    Article  Google Scholar 

  9. Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., Halgand, Y.: A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Saf. 139, 156–178 (2015)

    Article  Google Scholar 

  10. Kriaa, S., Bouissou, M., Piètre-Cambacédès, L.: Modeling the Stuxnet attack with BDMP: towards more formal risk assessments. In: 2012 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), pp. 1–8. IEEE (2012)

    Google Scholar 

  11. Piètre-Cambacédès, L., Deflesselle, Y., Bouissou, M.: Security modeling with BDMP: from theory to implementation. In: 2011 Conference on Network and Information Systems Security (SAR-SSI), pp. 1–8. IEEE (2011)

    Google Scholar 

  12. Kriaa, S., Bouissou, M., Laarouchi, Y.: A model based approach for SCADA safety and security joint modelling: S-Cube. In: IET System Safety and Cyber Security. IET Digital Library (2015)

    Google Scholar 

  13. Rocchetto, M., Tippenhauer, N.O.: Towards formal security analysis of industrial control systems. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 114–126. ACM (2017)

    Google Scholar 

  14. Turuani, M.: The CL-Atse protocol analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 277–286. Springer, Heidelberg (2006). https://doi.org/10.1007/11805618_21

    Chapter  Google Scholar 

  15. Rocchetto, M., Tippenhauer, N.O.: CPDY: extending the Dolev-Yao attacker with physical-layer interactions. In: Ogata, K., Lawford, M., Liu, S. (eds.) ICFEM 2016. LNCS, vol. 10009, pp. 175–192. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47846-3_12

    Chapter  Google Scholar 

  16. Behrmann, G., David, A., Larsen, K.G.: A tutorial on UPPAAL. In: Bernardo, M., Corradini, F. (eds.) SFM-RT 2004. LNCS, vol. 3185, pp. 200–236. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30080-9_7

    Chapter  Google Scholar 

  17. Puys, M., Potet, M.-L., Roch, J.-L.: Génération systématique de scénarios d’attaques contre des systèmes industriels. In: Approches Formelles dans l’Assistance au Développement de Logiciels, AFADL 2016, Besançon, France (2016)

    Google Scholar 

  18. ANSSI. Expression des besoins et identification des objectifs de sécurité. Agence nationale de la sécurité des systèmes d’information (2010)

    Google Scholar 

  19. CLUSIF. Méthode harmonisée d’analyse des risques (2010)

    Google Scholar 

  20. Clarke, E.M., Emerson, E.A.: Design and synthesis of synchronization skeletons using branching time temporal logic. In: Kozen, D. (ed.) Logic of Programs 1981. LNCS, vol. 131, pp. 52–71. Springer, Heidelberg (1982). https://doi.org/10.1007/BFb0025774

    Chapter  Google Scholar 

  21. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1981)

    Article  MathSciNet  MATH  Google Scholar 

  22. Cervesato, I.: The Dolev-Yao intruder is the most powerful attacker. In: 16th Annual Symposium on Logic in Computer Science–LICS, vol. 1 (2001)

    Google Scholar 

  23. IEC-60812. Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA). International Electrotechnical Commission (1985)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maxime Puys .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Puys, M., Potet, ML., Khaled, A. (2018). Generation of Applicative Attacks Scenarios Against Industrial Systems. In: Imine, A., Fernandez, J., Marion, JY., Logrippo, L., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2017. Lecture Notes in Computer Science(), vol 10723. Springer, Cham. https://doi.org/10.1007/978-3-319-75650-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75650-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75649-3

  • Online ISBN: 978-3-319-75650-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics