IMMAESA: A Novel Evaluation Method of IDPSs' Reactions to Cyber-Attacks on ICSs Using Multi-Objectives Heuristic Algorithms

IMMAESA: A Novel Evaluation Method of IDPSs' Reactions to Cyber-Attacks on ICSs Using Multi-Objectives Heuristic Algorithms

Mhamed Zineddine
Copyright: © 2021 |Pages: 34
DOI: 10.4018/IJISP.2021010104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The rise of digitization in industrial control systems using commercial off-the-shelf software has encouraged the use of existing IT security solutions. The aim of this study is to prevent intrusion detection and prevention systems' actions from affecting the normal functions of sensitive ICSs. A novel approach called IMMAESA based on a heuristic algorithm is proposed to evaluate the impact of IDPSs' actions when mitigating cyber-attacks. The crux of this novel approach is the IDPS does not react until it assesses the impact of its actions. The bat-algorithm is used to find an optimal solution that preserves the reliability of the system. IMMAESA method is simulated on a known nuclear power plant design, the APR1400. Results show that the proposed method lets the IDPS effectively makes tradeoffs before execution, thus, avoid any undesirable effects. The IDPS selects a set of actions (severity ~ 0,750 and reliability ~ 0,767) with minor consequences. Thus, the proposed method would be a major contribution to the ICT security field.
Article Preview
Top

1. Introduction

Information Communication Technology (ICT) has provided critical support for developing economies through support of civil and military infrastructures, public safety, and national security systems (Fritz, 2008). Nowadays, ICT is at the core of many critical and sensitive infrastructures in the form of Industrial Control Systems (ICS), such as nuclear facilities, electric power generation plants and industrial manufacturing systems. Security and Privacy have been major issues on multiple facets involving ICSs, Wireless Sensor Networks, and others (Hussain, and Kaliya, 2018; Liang, et. al. 2018; Niksaz and Kargar, 2012; Rao, Srivastava, and Sreekanth, 2017). Systems overseen by Supervisory Control and Data Acquisitions (SCADAs) and SCADAs themselves have become primary targets of cyber-attacks for decades. These attacks have the potential to inflict serious damages (Oman et al. 2001).

Commercial Off-The-Shelf (COTS) products including operating systems, applications, and communication protocols have been replacing proprietary products designed specifically for SCADAs (Wright, 2011). The new shift to adopt COTS in ICSs and SCADAs designs has propelled the implementation of generic security solutions. Among these solutions are Intrusion Detection Prevention Systems (IDPS), which could be integrated as a part of or as a standalone ICT security solution. They are security systems designed to identify malicious activities, log them, report them, and attempt to stop them (Scarfone and Mell, 2007). However, IDPSs behavior might be catastrophic for sensitive ICSs, such as Nuclear Power Plants (NPPs). Actions designed to block a port or disconnect a network zone might prevent an attack, however, they might affect the normal functioning of a subsystem and therefore have disastrous ramifications. This paper proposes a novel evaluation method of IDPSs actions that takes into consideration the safety and reliability of the overall system/plant, while attempting to prevent cyber-attacks. The crux of this novel approach is that the IDPS does not react until it assesses the impact of its actions. That is, identified remediation actions are evaluated following the four steps proposed by the novel method of this study before execution.. If the actions proposed by the IDPS do not threaten the normal functioning of the whole system, especially safety subsystems, the proposed actions are applied, otherwise, the instructions will not be executed, as there are greater probabilities that they might lead to a disaster. The main contribution of the novel IMMAESA approach is the different way security actions (mechanisms) are being selected and applied. In this approach, the proposed mitigation techniques are evaluated as a whole, before they are applied to avoid any undesirable consequences, such as reactor meltdown in NPPs. The optimal solution from available combinations of actions is identified according to multiple parameters and variables using advanced algorithms.

The remainder of this paper is structured as follows: The second (following) section relates to the background of the study, which reviews some of the recent studies relating to ICSs and SCADA’s security issues; Severity Analysis and Assessment of IDPSs actions; the algorithm adopted in this study; and the concept of systems reliability. The third section presents the proposed method, which is the Intrusion Modes, Mitigation Actions and Effects Severity Analysis (IMMAESA); the fourth section presents the application of IMMAESA on a Nuclear Power Plant; the fifth section presents and discusses the numerical results; followed by a conclusion.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing