Abstract
SCADA systems play a vital role in the efficient operations of the ports’ Critical Infrastructures (CIs) and their Maritime Logistics and Supply Chain Services (MLoSC). In this paper we provide a process-centric modeling approach using BPMN 2.0 specification in order to visualize an attack likely to be detected on SCADA systems. The SCADA model serves as a study on how security concepts (e.g. security paths, vulnerabilities, propagation of attacks) can be represented with modeling notations.
Notes
References
Mattioli, R., Moulinos, K.: Analysis of ICS-SCADA cyber security maturity levels in critical sectors, European Union Agency for Network and Information Security (ENISA) (2015)
Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., Hahn, A.: Guide to industrial control systems (ICS) security, NIST, Special Publication 800-82 Rev.2 (2014)
Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Comput. Secur. 25, 498–506 (2006)
Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: SCADA security in the light of Cyber-Warfare. Comput. Secur. 31, 418–436 (2012)
The U.S. Department of Homeland Security/Office of Cyber and Infrastructure Analysis (DHS/OCIA): Consequences to seaport operations from malicious cyber activity, Critical Infrastructure Security and Resilience Note, Operational Analysis Division (2016)
Parfomak, P.W., Frittelli, J.: Maritime Security: Potential Terrorist Attacks and Protection Priorities, CRS report for Congress, Congressional Research Service (2007)
Daryabar, F., Dehghantanha, A., Udzir, N.I., Mohd Sani, N.F.B., Bin Shamsuddin, S.: Towards Secure Model for SCADA Systems. In: Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, pp. 60–64 (2012)
Papastergiou, S., Polemi, N., Papagiannopoulos, I.: Business and threat analysis of ports’ supply chain services. In: Tryfonas T., Askoxylakis I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 642–653 Springer Cham (2015)
Ma, Z., Smith, P.: Determining risks from advanced multi-step attacks to critical information infrastructures. In: Luiijf, E., Hartel, P. (eds.) CRITIS 2013. LNCS, vol. 8328, pp. 142–154. Springer Cham (2013)
Musman, S., Temin, A., Tanner, M., Fox, D., Pridemore, B.: Evaluating the impact of cyber attacks on missions. In: 5th European Conference on Information Management and Evaluation, ECIME 2011, pp. 446–456 (2011)
Braxton, M.O., Rowell, M.K., Butler, K.A., Haselkorn, M.: A Human-Centered Approach to Modeling Security Information and its Impact on Cargo Operations for Guidance in the Design of Interventions in the Information Sharing Environment, MODSIM World (2016). http://www.modsimworld.org
Altuhhova, O., Matulevičius, R., Ahmed, N.: Towards Definition of Secure Business Processes. In: Bajec, M., Eder, J. (eds.) Advanced Information Systems Engineering Workshops, CAiSE 2012, LNBIP, vol. 112, pp. 1–15. Springer, Berlin, Heidelberg (2012)
Kosuri, K., Fjørtoft, K.E.: E-Collaboration for maritime operations using business process modeling. Int. J. Adv. Sci. Technol. 34, 101–112 SERSC (2011)
Meland, P.H., Gjære, E.A.: Representing threats in BPMN 2.0. In: 7th IEEE International Conference on Availability, Reliability & Security (ARES2012), pp. 524–550. IEEE (2012)
Acknowledgements
This work has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 653212 project MITIGATE and the Erasmus + project OMI-KA2 project. The authors also thank all partners of these projects. Finally, special thanks to the University of Piraeus, Research Center for its continuous support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kalogeraki, EM., Polemi, N., Papastergiou, S., Panayiotopoulos, T. (2018). Modeling SCADA Attacks. In: Yang, XS., Nagar, A., Joshi, A. (eds) Smart Trends in Systems, Security and Sustainability. Lecture Notes in Networks and Systems, vol 18. Springer, Singapore. https://doi.org/10.1007/978-981-10-6916-1_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-6916-1_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6915-4
Online ISBN: 978-981-10-6916-1
eBook Packages: EngineeringEngineering (R0)