Skip to main content

Hidden Vulnerabilities Due to Interdependencies between Two Systems

  • Conference paper
Critical Information Infrastructures Security

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7722))

Abstract

Critical infrastructures (CIs) deserve increased attention as our societies simply rely on most of the goods and services they are expected to continuously supply. Interdependencies within and among CIs have dramatically increased the overall complexity of related infrastructure systems, making them more vulnerable to cascading failures with widespread unpredicted consequences. It is vital to get a clear understanding of these often hidden interdependency issues and tackle them through advanced techniques. In this paper, the interdependencies between Industrial Control Systems (ICS), in particular the SCADA (Supervisory Control and Data Acquisition) system, and the underlying System Under Control (SUC) are identified and assessed using modeling/simulation methods by following a modified 4-step methodical framework. This paper mainly focuses on those techniques and analytical experiments developed for the essential step of this methodical framework, the in-depth analysis, i.e., applying a hybrid modeling/simulation approach and three in-depth experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rinaldi, S.M., Peerenboom, J.P., Kelly, T.: Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies. IEEE Control Systems Magazine 21, 11–25 (2001)

    Article  Google Scholar 

  2. Griot, C.: Modelling and simulation for critical infrastructure interdependency assessment: A meta-review for model characterisation. International Journal of Critical Infrastructure 6, 363–379 (2010)

    Article  Google Scholar 

  3. Igure, V.M., Laughter, S.A., Williams, R.: Security Issues in SCADA Networks. Journal of Computers and Security 25, 498–506 (2006)

    Article  Google Scholar 

  4. Christansson, H., Luiijf, E.: Creating a European SCADA Security Testbed. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection. IFIP, vol. 253, pp. 237–247. Springer, Boston (2007)

    Chapter  Google Scholar 

  5. Johnson, R.E.: Survey of SCADA security challenges and potential attack vectors. In: Internet Technology and Secured Transactions (ICITST) 2010, p. 5 (2010)

    Google Scholar 

  6. Eusgeld, I., Kröger, W.: Towards a Framework for Vulnerability Analysis of Interconnected Infrastructures. In: 9th International Probabilistic Safety Assessment & Management Conference (2008)

    Google Scholar 

  7. Kröger, W., Zio, E.: Vulnerable Systems. Springer (2011)

    Google Scholar 

  8. Pederson, P., Dudenhoeffer, D., Hartly, S., Permann, M.: Critical Infrastructure Interdependency Modeling: A Survey of U.S and International Research. Idaho National Laboratory (2006)

    Google Scholar 

  9. Johansson, J., Hassel, H.: An approach for modelling interdependent infrastructures in the context of vulnerability analysis. Reliability Engineering and System Safety 95, 1335–1344 (2010)

    Article  Google Scholar 

  10. Nan, C., Kröger, W., Probst, P.: Exploring critical infrastructure interdependnecy by hybrid simulation approach. In: ESREL 2011, pp. 2483–2491 (2011)

    Chapter  Google Scholar 

  11. Schläpfer, M., Kessler, T., Kröger, W.: Reliability Analysis of Electric Power Systems Using an Object-oriented Hybrid Modeling Approach. In: 16th Power Systems Computation Conference (2008)

    Google Scholar 

  12. Nan, C., Eusgeld, I.: Exploring impacts of single failure propagation between SCADA and SUC. In: IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) 2011, pp. 1564–1568 (2011)

    Google Scholar 

  13. van Steen, M.: Graph Theory and Complex Networks: An Introduction, 1st edn (2010)

    Google Scholar 

  14. Caretta Cartozo, C.: Complex networks: from biological applications to exact theoretical solutions. In: EPFL (2009)

    Google Scholar 

  15. Gallos, L.K., Cohen, R., Argyrakis, P., Bunde, A., Havlin, S.: Stability and Topology of Scale-Free Networks under Attack and Defense Strategies. Physical Review Letters 94, 188701 (2005)

    Article  Google Scholar 

  16. Kröger, W.: Critical infrastructure at risk: A Need For A New Conceptual Approach and Extended Analytical Tools. Reliability Engineering and System Safety 93, 1781–1787 (2008)

    Article  Google Scholar 

  17. Eusgeld, I., Nan, C., Dietz, S.: System-of-systems. Approach for Interdependent Critical Infrastructures. Reliability Engineering and System Safety 96, 679–686 (2011)

    Article  Google Scholar 

  18. Bloomfield, R., Chozos, N., Nobles, P.: Infrastructure interdependency analysis: Introductory research review (2009)

    Google Scholar 

  19. Nan, C., Eusgeld, I.: Adopting HLA standard for interdependency study. Reliability Engineering and System Safety 96, 149–159 (2010)

    Article  Google Scholar 

  20. Nan, C., Eusgeld, I., Kroeger, W.: Assessing CI Interdependency Issues using an HLA-compliant Simulation Platform. In: The 2012 Annual European Safety and Reliability Conference, ESREL (2012)

    Google Scholar 

  21. Balducelli, C., Bologna, S., Lavalle, L., Vicoli, G.: Safeguarding information intensive critical infrastructures against novel types of emerging failures. Reliability Engineering and System Safety 92, 1218–1229 (2007)

    Article  Google Scholar 

  22. Nai Fovino, I., Masera, M., Guidi, L., Carpi, G.: An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants. In: 3rd Conference on Human System Interactions (HSI), pp. 679–686 (2010)

    Google Scholar 

  23. Queiroz, C., Mahmood, A., Jiankun, H., Tari, Z., Xinghuo, Y.: Building a SCADA Security Testbed. In: 3rd International Conference on Network and System Security, pp. 357–364 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nan, C., Eusgeld, I., Kröger, W. (2013). Hidden Vulnerabilities Due to Interdependencies between Two Systems. In: Hämmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds) Critical Information Infrastructures Security. Lecture Notes in Computer Science, vol 7722. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41485-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41485-5_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41484-8

  • Online ISBN: 978-3-642-41485-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics