Mitigating cyberattack related domino effects in process plants via ICS segmentation

Journal of Information Security and Applications - Tập 51 - Trang 102450 - 2020
Raditya Arief1, Nima Khakzad2, Wolter Pieters1
1Faculty of Technology, Policy and Management, Delft University of Technology, Delft, the Netherlands
2School of Occupational and Public Health, Ryerson University, Toronto, Canada

Tài liệu tham khảo

Agena Ltd. (2009). Retrieved fromwww.AgenaRisk.co.uk. Aghassi, 2006, Robust game theory, Math Program, 107, 231, 10.1007/s10107-005-0686-0 ALOHA (2016). Retrieved from https://www.epa.gov/cameo/aloha-software. Arturson, 1987, The tragedy of San Juanico—the most severe LPG disaster in history, Burns, 13, 87, 10.1016/0305-4179(87)90096-9 2012, Network segmentation and segregation Boyes, H. (2013). Trustworthy cyber-physical systems-a review. Brice, A. (2009). Puerto Rico fire linked to faulty gas tank monitoring system. Retrieved from http://edition.cnn.com/2009/US/11/17/puerto.rico.fire.investigation/index.html. Byres, 2004, The myths and facts behind cyber security risks for industrial control systems Cardenas, 2009, Challenges for securing cyber physical systems Cox, 2009, Game theory and risk analysis, Risk Anal, 29, 1062, 10.1111/j.1539-6924.2009.01247.x Cozzani, 2005, The assessment of risk caused by domino effect in quantitative area risk analysis, J Hazard Mater, 127, 14, 10.1016/j.jhazmat.2005.07.003 Cozzani, 2006, Escalation thresholds in the assessment of domino accidental events, J Hazard Mater, 129, 1, 10.1016/j.jhazmat.2005.08.012 Crucitti, 2004, Error and attack tolerance of complex networks, Physica A, 340, 388, 10.1016/j.physa.2004.04.031 Csardi, 2006, The igraph software package for complex network research, InterJ Complex Syst, 1695, 1 Freeman, 1978, Centrality in social networks conceptual clarification, Soc Netw, 1, 215, 10.1016/0378-8733(78)90021-7 Hayden, 2014, An abbreviated history of automation & industrial controls systems and cybersecurity ICS-CERT, & NCCIC (2016). Recommended practice: improving industrial control system cybersecurity with defense-in-depth strategies. Retrieved from https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf. Khakzad, 2013, Domino effect analysis using Bayesian networks, Risk Anal, 33, 292, 10.1111/j.1539-6924.2012.01854.x Khakzad, 2015, Using graph theory to analyze the vulnerability of process plants in the context of cascading effects, Reliab Eng Syst Saf, 143, 63, 10.1016/j.ress.2015.04.015 Khakzad, 2016, Vulnerability analysis of process plants subject to domino effects, Reliab Eng Syst Saf, 154, 127, 10.1016/j.ress.2016.06.004 Khakzad, 2019, Low-capacity utilization of process plants: a cost-robust approach to tackle man-made domino effects, Reliab Eng Syst Saf, 191, 10.1016/j.ress.2018.03.030 Khan, 1998, Models for domino effect analysis in chemical process industries, Process Saf Prog, 17, 107, 10.1002/prs.680170207 Knapp, 2014 Lee, 2014, German steel mill cyber attack, Ind Control Syst, 30 Lewis, P., & Macalister, T. (2010). Buncefield fire: Oil storage firm found guilty of safety breaches. Retrieved fromhttps://www.theguardian.com/uk/2010/jun/18/buncefield-fire-oil-company-guilty. Matches (2014). Retrieved from http://matche.com/equipcost/Tank.html. McMillan, 2018, New type of cyberattack targets factory safety systems, Wall Street J Nicholas, P. (2017). Mind the air gap: network separation's cost, productivity and security drawbacks. Retrieved from https://www.microsoft.com/en-us/cybersecurity/blog-hub/mind-the-air-gap-network-separation. Pearl, 2014 Reniers, 2008, Knock-on accident prevention in a chemical cluster, Expert Syst Appl, 34, 42, 10.1016/j.eswa.2006.08.033 Rew, 2004, Development of a method for the determination of on-site ignition probabilities Sanger, 2012 Schmidt, M. S., & Perlroth, N. (2013). Obama order gives firms cyberthreat information. Retrieved from http://www.nytimes.com/2013/02/13/us/executive-order-on-cybersecurity-is-issued.html. Security Roundtable (2018). ‘Tried and true’ network segmentation can come to the rescue. Retrieved fromhttps://www.securityroundtable.org/tried-true-network-segmentation-can-come-rescue/. Siemens (2008). Security concept PCS 7 and WinCC - basic document (Whitepaper). Retrieved fromhttps://cache.industry.siemens.com/dl/files/131/26462131/att_80283/v1/wp_sec_b.pdf. Srivastava, 2010, New methodologies for security risk assessment of oil and gas industry, Process Saf Environ Prot, 88, 407, 10.1016/j.psep.2010.06.004 Stouffer, 2011, Guide to industrial control systems (ICS) security, NIST Spec Publ, 800 Wagner, 2017, A nature-inspired decision system for secure cyber network architecture Wang, 2014, Robustness of Internet under targeted attack: a cascading failure perspective, J Netw Comput Appl, 40, 97, 10.1016/j.jnca.2013.08.007 Zhao, 2004, Attack vulnerability of scale-free networks due to cascading breakdown, Phys Rev E, 70, 10.1103/PhysRevE.70.035101