Security Verification of Industrial Control Systems using Partial Model Checking

T. Kulik, Jalil Boudjadar, P. Tran-Jørgensen
{"title":"Security Verification of Industrial Control Systems using Partial Model Checking","authors":"T. Kulik, Jalil Boudjadar, P. Tran-Jørgensen","doi":"10.1145/3372020.3391558","DOIUrl":null,"url":null,"abstract":"Industrial control systems are moving from isolated to distributed and cloud-connected architectures. While the operational benefits of this migration form the driving force for this trend, the necessary security assurance is often difficult to achieve. Formal methods, including model checking, provide capable technologies to deal with this challenge. However, when formal verification must account for the complexity of modern control systems the state space being explored grows drastically as more details are included in the analysis. This may eventually cause a state space explosion, which makes formal verification infeasible. To address this, we propose a method for decomposing cloud-connected control systems into modules representing the different parts of the system (clients, the cloud, the control network, etc.). Based on the decomposed version of the system, we use UPPAAL to model several well-known cyber attacks and formally verify the system’s behavior under these attacks. To determine viability of our approach, we first use statistical model checking SMC to assess the probabilities of success for selected attacks. Based on SMC outcomes, we use symbolic model checking to individually analyse the sub-system affected by each attack. The results obtained from this analysis are then used to demonstrate the feasibility of our approach. We demonstrate our method using an actual control system architecture provided by our industrial partner. CCS Concepts • Security and privacy → Logic and verification; Denial-of-service attacks; Security requirements.","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3372020.3391558","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Industrial control systems are moving from isolated to distributed and cloud-connected architectures. While the operational benefits of this migration form the driving force for this trend, the necessary security assurance is often difficult to achieve. Formal methods, including model checking, provide capable technologies to deal with this challenge. However, when formal verification must account for the complexity of modern control systems the state space being explored grows drastically as more details are included in the analysis. This may eventually cause a state space explosion, which makes formal verification infeasible. To address this, we propose a method for decomposing cloud-connected control systems into modules representing the different parts of the system (clients, the cloud, the control network, etc.). Based on the decomposed version of the system, we use UPPAAL to model several well-known cyber attacks and formally verify the system’s behavior under these attacks. To determine viability of our approach, we first use statistical model checking SMC to assess the probabilities of success for selected attacks. Based on SMC outcomes, we use symbolic model checking to individually analyse the sub-system affected by each attack. The results obtained from this analysis are then used to demonstrate the feasibility of our approach. We demonstrate our method using an actual control system architecture provided by our industrial partner. CCS Concepts • Security and privacy → Logic and verification; Denial-of-service attacks; Security requirements.
基于部分模型检验的工业控制系统安全验证
工业控制系统正从孤立的架构转向分布式和云连接的架构。虽然这种迁移的操作好处形成了这一趋势的驱动力,但必要的安全保证往往难以实现。正式的方法,包括模型检查,提供了处理这一挑战的有效技术。然而,当形式验证必须考虑现代控制系统的复杂性时,随着分析中包含更多细节,所探索的状态空间急剧增长。这可能最终导致状态空间爆炸,使形式验证变得不可行的。为了解决这个问题,我们提出了一种方法,将云连接的控制系统分解为代表系统不同部分(客户端、云、控制网络等)的模块。基于系统的分解版本,我们使用UPPAAL对几种已知的网络攻击进行建模,并形式化验证系统在这些攻击下的行为。为了确定我们方法的可行性,我们首先使用统计模型检查SMC来评估选定攻击的成功概率。基于SMC结果,我们使用符号模型检查来单独分析受每种攻击影响的子系统。从这个分析得到的结果,然后用来证明我们的方法的可行性。我们使用我们的工业合作伙伴提供的实际控制系统架构来演示我们的方法。•安全和隐私→逻辑和验证;拒绝服务攻击;安全需求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信