Computer Science ›› 2019, Vol. 46 ›› Issue (5): 105-110.doi: 10.11896/j.issn.1002-137X.2019.05.016

Previous Articles     Next Articles

Risk Modeling for Cyber-physical Systems Based on State/Event Fault Trees

XU Bing-feng1, HE Gao-feng2, ZHANG Li-ning1   

  1. (College of Information Science and Technology,Nanjing Forestry University,Nanjing 210037,China)1
    (School of Internet of Things,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)2
  • Received:2018-03-30 Revised:2018-06-03 Published:2019-05-15

Abstract: The cyber-physical system is prone to be attacked by the network attacker because of the application of embedded system network in it,and the attacker may utilize the vulnerabilities in the software and communication components to control the system,resulting in a system failure.The existing modeling methods of integrating safety and securi-ty are built on traditional static fault trees,and don’t consider the characteristics of dynamic and temporal dependencies of the software control system,so they can’t infer the final impacts caused by network attracts.In light of this,this paper presented a modeling method of integrating safety and security of cyber-physical systems.Firstly,the Attack-SEFTs model is proposed based on SEFTs model.On this basis,common vulnerabilities in the cyber physical system are proposed,and various vulnerability patterns are modeled based on Attack-SEFTs.Secondly,the unified representation of the Attack-SEFTs model is presented to support its analysis.Finally,a case study is described specially to show the feasibi-lity of the proposed method.

Key words: Cyber-physical systems, Safety, Security, State/event fault trees, Attack trees

CLC Number: 

  • TP393
[1]BAHETI R,GILL H.Cyber-physical systems[J].The impact of control technology,2011,12(1):161-166.
[2]ROTH M,LIGGESMEYER P.Modeling and analysis of safety-critical cyber physical systems using state/event fault trees[C]∥SAFECOMP 2013-Workshop DECS (ERCIM/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety,Reliabi-lity and Security.Toulouse,France:Springer International Publishing,2013:1-11.
[3]GUO Q L,XIN S J,WANG J H,et al.Comprehensive Security Assessment for a cyber physical energy system:a lesson from Ukraine’s Blackout [J].Automation of Electric Power Systems,2016,40(5):145-147.(in Chinese)郭庆来,辛蜀骏,王剑辉,等.由乌克兰停电事件看信息能源系统综合安全评估[J].电力系统自动化,2016,40(5):145-147.
[4]TANG Y,CHEN Q,LI M Y,et al.Overview on Cyber-attacks Against Cyber Physical Power System [J].Automation of Electric Power Systems,2016,40(17):59-69.(in Chinese)汤奕,陈倩,李梦雅,等.电力信息物理融合系统环境中的网络攻击研究综述[J].电力系统自动化,2016,40(17):59-69.
[5]BRUNNER M,HUBER M,SAUERWEIN C,et al.Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems[C]∥2017 IEEE International Conference on Software Quality,Reliability and Security Companion (QRSC).Prague:IEEE Press,2017:334-340.
[6]WOSKOWSKI C.A pragmatic approach towards safe and secure medical device integration[C]∥International Conference on Computer Safety,Reliability,and Security.Florence:Springer,2014:342-353.
[7]NAGARAJU V,FIONDELLA L,WANDJI T.A survey of fault and attack tree modeling and analysis for cyber risk management[C]∥2017 IEEE International Symposium on Technologies for Homeland Security (HST).Waltham,MA,USA:IEEE Press,2017:1-6.
[8]MACHER G,MESSNARZ R,ARMENGAUD E,et al.IntegratedSafety and Security Development in the Automotive Domain:2017-01-1661 [R].USA:SAE Technical Paper,2017.
[9]KAISER B,GRAMLICH C,FÖRSTER M.State/event faulttrees-A safety analysis model for software-controlled systems[J].Reliability Engineering & System Safety,2007,92(11):1521-1537.
[10]KRIAA S,PIETRE-CAMBACEDES L,BOUISSOU M,et al.A survey of approaches combining safety and security for industrialcontrol systems[J].Reliability Engineering & System Safety,2015,139(3):156-178.
[11]KORDY B,PIÉTRE-CAMBACÉDÉS L,SCHWEITZER P.
DAG-based attack and defense modeling:Don’t miss the forest for the attack trees[J].Computer Science Review,2014,13:1-38.
[12]FOVINO I N,MASERA M,DE CIAN A.Integrating cyber attacks within fault trees[J].Reliability Engineering & System Safety,2009,94(9):1394-1402.
[13]MAX S.Integrating Security Concerns into Safety Analysis of Embedded Systems Using Component Fault Trees [D].Kaiserslautern:Technische Universität Kaiserslautern,2016.
[14]CHOCKALINGAM S,HADŽIOSMANOVIC' D,PIETERS W,et al.Integrated safety and security risk assessment methods:a survey of key characteristics and applications[C]∥International Conference on Critical Information Infrastructures Security.Pa-ris:Springer,2016:50-62.
[15]XU B,HUANG Z,HU J,et al.Minimal cut sequence generation for state/event fault trees[C]∥Proceedings of the 2013 Middleware Doctoral Symposium.Beijing:ACM,2013:3-10.
[16]ISHTIAQ ROUFA R M,MUSTAFAA H,TRAVIS TAYLORA S O,et al.Security and privacy vulnerabilities of in-car wireless networks:A tire pressure monitoring system case study[C]∥19th USENIX Security Symposium.Washington DC:USENIX Association,2010:11-13.
[1] LV Xiao-hu, HAN Xiao-dong, GONG Jiang-lei, WANG Zhi-jie, LIU Xiao-kun. Systemic Muti-factors Based Verification Method for Safety-critical Software [J]. Computer Science, 2019, 46(9): 156-161.
[2] QI Bin,WANG Yu,ZOU Hong-xia,LI Ji-xing. Adaptive Testing Technology Based on Cognitive Diagnostic in Cybersecurity [J]. Computer Science, 2019, 46(7): 102-107.
[3] LI Peng-fei, CHEN Ming, DENG Li, QIAN Hong-yan. NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol [J]. Computer Science, 2019, 46(6A): 343-347.
[4] SUN Bao-hua, HU Nan, LI Dong-yang. Analysis Research of Software Requirement Safety Based on Neural Network and NLP [J]. Computer Science, 2019, 46(6A): 348-352.
[5] FENG Gui-lan, LI Zheng-nan, ZHOU Wen-gang. Research on Application of Big Data Analytics in Network [J]. Computer Science, 2019, 46(6): 1-20.
[6] ZHANG Jie-hui, PAN Chao, ZHANG Yong. Network System Risk Assessment Model with Optimal Weights [J]. Computer Science, 2019, 46(6): 148-152.
[7] PENG Lei, ZANG Guo-zhen, GAO Yuan-yuan, SHA Nan, XI Chen-jing, JIANG Xuan-you. Research and Application of LMS Adaptive Interference Cancellation in Physical Layer SecurityCommunication System Based on Artifical Interference [J]. Computer Science, 2019, 46(6): 168-173.
[8] PEI Lan-zhen, ZHAO Ying-jun, WANG Zhe, LUO Yun-qian. Comparison of DGA Domain Detection Models Using Deep Learning [J]. Computer Science, 2019, 46(5): 111-115.
[9] FU Ze-qiang, WANG Xiao-feng, KONG Jun. High-performance Association Analysis Method for Network Security Alarm Information [J]. Computer Science, 2019, 46(5): 116-121.
[10] HAN Zhong-ming, ZHENG Chen-ye, DUAN Da-gao, DONG Jian. Associated Users Mining Algorithm Based on Multi-information Fusion Representation Learning [J]. Computer Science, 2019, 46(4): 77-82.
[11] LIU Ming-cong, WANG Na, ZHOU Ning. Dependency Analysis Based Cloud Composition Service Information Flow Control Mechanism [J]. Computer Science, 2019, 46(4): 189-196.
[12] ZHAO Meng-yao, LI Xiao-yu. Bidirectional Anonymous Secret Communication Protocol Based on Onion Routing [J]. Computer Science, 2019, 46(4): 164-171.
[13] SUN Lian-shan, OUYANG Xiao-tong, XU Yan-yan, WANG Yi-xing. Novel Sanitization Approach for Indirect Dependencies in Provenance Graph [J]. Computer Science, 2019, 46(3): 164-169.
[14] CHEN Hao, LUO Lei, LI Yun, CHEN Li-rong. Study on Formal Verification of Secure Virtual Machine Monitor [J]. Computer Science, 2019, 46(3): 170-179.
[15] ZHAO Jiao-jiao, MA Wen-ping, LUO Wei, LIU Xiao-xue. Hierarchical Hybrid Authentication Model Based on Key Sharing [J]. Computer Science, 2019, 46(2): 115-119.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[2] LIAO Xing, YUAN Jing-ling and CHEN Min-cheng. Parallel PSO Container Packing Algorithm with Adaptive Weight[J]. Computer Science, 2018, 45(3): 231 -234, 273 .
[3] YANG Yu-qi, ZHANG Guo-an and JIN Xi-long. Dual-cluster-head Routing Protocol Based on Vehicle Density in VANETs[J]. Computer Science, 2018, 45(4): 126 -130 .
[4] PANG Bo, JIN Qian-kun, HENIGULI·Wu Mai Er and QI Xing-bin. Routing Scheme Based on Network Slicing and ILP Model in SDN[J]. Computer Science, 2018, 45(4): 143 -147 .
[5] LUO Xiao-yang, HUO Hong-tao, WANG Meng-si and CHEN Ya-fei. Passive Image-splicing Detection Based on Multi-residual Markov Model[J]. Computer Science, 2018, 45(4): 173 -177 .
[6] ZHANG Jing and ZHU Guo-bin. Hot Topic Discovery Research of Stack Overflow Programming Website Based on CBOW-LDA Topic Model[J]. Computer Science, 2018, 45(4): 208 -214 .
[7] WEN Jun-hao, SUN Guang-hui and LI Shun. Study on Matrix Factorization Recommendation Algorithm Based on User Clustering and Mobile Context[J]. Computer Science, 2018, 45(4): 215 -219, 251 .
[8] JIA Wei, HUA Qing-yi, ZHANG Min-jun, CHEN Rui, JI Xiang and WANG Bo. Mobile Interface Pattern Clustering Algorithm Based on Improved Particle Swarm Optimization[J]. Computer Science, 2018, 45(4): 220 -226 .
[9] ZHU Wen-qiang. Personalized Trustworthy Group Identifying Model Based on O2O Service-oriented Mobile Social Network[J]. Computer Science, 2018, 45(6): 76 -83 .
[10] DING Shu-yang, LI Bing and SHI Hong-bo. Study on Flexible Job-shop Scheduling Problem Based on Improved Discrete Particle Swarm Optimization Algorithm[J]. Computer Science, 2018, 45(4): 233 -239, 256 .