Skip to main content

Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack Modeling

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9922))

Abstract

In the last decade, the amount of cyber-attacks targeting industrial facilities with specialized knowledge, tools and malware increased dramatically. The wide variety of industrial IT-systems and various required expertise for cyber-physical attack modeling is currently a challenge for interdisciplinary research. To address the variety of systems and get a point of reference, we merged architecture descriptions from available resources. Based on this reference architecture, we introduce attack scopes and provide exemplary attack scenarios per scope. As modeling strategy for the introduced scopes and to realize abstracted representations of particular industrial facility architectures, a component-based modeling approach is proposed. The main contribution of the presented work is a first generic attack modeling technique facilitating the required interdisciplinary collaboration in this important field of research.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. ICS-CERT: IR-ALERT-H-16-056-01 Cyber-Attack Against Ukrainian Critical Infrastructure. https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01 (2016)

  2. Harp, D., Gregory-Brown, B.: The State of Security in Control Systems Today. https://www.sans.org/reading-room/whitepapers/analyst/state-security-control-systems-today-36042 (2015)

  3. Cherdantseva, Y., Hilton, J.: A reference model of information assurance & security. In: Eighth International Conference on Availability, Reliability and Security (ARES), pp. 546–555. IEEE (2013)

    Google Scholar 

  4. Lang, A., Dittmann, J., Kiltz, S., Hoppe, T.: Future perspectives: the car and its IP-address – a potential safety and security risk assessment. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 40–53. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. U.S. Department of Homeland Security: Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies. https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/Defense_in_Depth_Oct09.pdf (2009)

  6. Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., Hahn, A.: Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology (2015)

    Google Scholar 

  7. Krotofil, M., Gollmann, D.: Industrial control systems security: what is happening? In: 2013 11th IEEE International Conference on Industrial Informatics (INDIN), pp. 670–675. IEEE (2013)

    Google Scholar 

  8. Ahmed, I., Obermeier, S., Naedele, M., Richard III, G.G.: SCADA systems: challenges for forensic investigators. Computer 45, 44–51 (2012)

    Article  Google Scholar 

  9. Howard, J.D., Longstaff, T.A.: A common language for computer security incidents. Sandia National Laboratories (1998)

    Google Scholar 

  10. Kordy, B., Piètre-Cambacédès, L., Schweitzer, P.: DAG-based attack and defense modeling: don’t miss the forest for the attack trees. Comput. Sci. Rev. 13–14, 1–38 (2014)

    Article  MATH  Google Scholar 

  11. Bendik, F., Schmidt, N.: Exchange of engineering data for communication systems based on AutomationML using an EtherNet/IP example. Presented at the ODVA Industry Conference and 17th Annual Meeting, Friso, Texas, USA (2015)

    Google Scholar 

  12. Sommestad, T., Ekstedt, M., Holm, H.: The cyber security modeling language: a tool for assessing the vulnerability of enterprise system architectures. Syst. J. IEEE 7, 363–373 (2013)

    Article  Google Scholar 

  13. Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Assessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastruct. 9, 93–110 (2013)

    Article  Google Scholar 

  14. U.S. Department of Homeland Security: Seven Steps to Effectively Defend Industrial Control Systems. https://ics-cert.us-cert.gov/sites/default/files/documents/Seven%20Steps%20to%20Effectively%20Defend%20Industrial%20Control%20Systems_S508C.pdf (2016)

  15. The MITRE Corporation: CVE-2016-2200 (2016)

    Google Scholar 

  16. Floyd, S.: RFC 3360 Inappropriate TCP Resets Considered Harmful. https://tools.ietf.org/html/rfc3360 (2002)

  17. CENELEC: EN 61158-4-3:2014: Industrial communication networks - Fieldbus specifications - Part 4-3: Data-link layer protocol specification - Type 3 elements (IEC 61158-4-3:2014) (2014)

    Google Scholar 

  18. The MITRE Corporation: CVE-2015-1356 (2015)

    Google Scholar 

  19. The MITRE Corporation: CVE-2010-2772 (2010)

    Google Scholar 

  20. Object Management Group: OMG Unified Modeling Language (OMG UML) Version 2.5. http://www.omg.org/spec/UML/2.5 (2015)

  21. Mauerer, W.: Professional Linux Kernel Architecture. Wiley, Indianapolis (2008)

    Google Scholar 

  22. Tanenbaum, A.S.: Modern Operating Systems. Pearson Education, Upper Saddle River (2009)

    MATH  Google Scholar 

  23. Siemens AG: CPU-CPU Communication with SIMATIC Controllers (SIMATIC S7) Version 2.1. https://cache.industry.siemens.com/dl/files/908/78028908/att_32073/v1/78028908_SIMATIC_Comm_DOKU_v21_e.pdf (2013)

  24. ISO/IEC: ISO/IEC 7498-1:1994(E) Information technology - Open Systems Interconnection - Basic Reference Model (1994)

    Google Scholar 

  25. Fischer, R., Clausing, R., Dittmann, J., Ding, Y.: Industrie 4.0 Schwachstellen: Basisangriffe und Szenarien. In: Proceedings of DACH Security 2016 (2016, to appear)

    Google Scholar 

Download references

Acknowledgements

The presented work is funded by the German Federal Ministry of Economic Affairs and Energy (BMWi, project no. 1501502A, 1501502B) in the framework of the German reactor safety research program. The authors thank all project partners and reviewers for their helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert Clausing .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Clausing, R., Fischer, R., Dittmann, J., Ding, Y. (2016). Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack Modeling. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2016. Lecture Notes in Computer Science(), vol 9922. Springer, Cham. https://doi.org/10.1007/978-3-319-45477-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45477-1_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45476-4

  • Online ISBN: 978-3-319-45477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics