STRIDE-based threat modeling for cyber-physical systems
2017
https://doi.org/10.1109/ISGTEUROPE.2017.8260283Abstract
Critical infrastructures and industrial control systems are complex Cyber-Physical Systems (CPS). To ensure reliable operations of such systems, comprehensive threat modeling during system design and validation is of paramount significance. Previous works in literature mostly focus on safety, risks and hazards in CPS but lack effective threat modeling necessary to eliminate cyber vulnerabilities. Further, impact of cyber attacks on physical processes is not fully understood. This paper presents a comprehensive threat modeling framework for CPS using STRIDE, a systematic approach for ensuring system security at the component level. This paper first devises a feasible and effective methodology for applying STRIDE and then demonstrates it against a real synchrophasor-based synchronous islanding testbed in the laboratory. It investigates (i) what threat types could emerge in each system component based on the security properties lacking, and (ii) how a vulnerability in a system component risks the entire system security. The paper identifies that STRIDE is a light-weight and effective threat modeling methodology for CPS that simplifies the task for security analysts to identify vulnerabilities and plan appropriate component level security measures at the system design stage.
References (24)
- R. M. Lee, M. J. Assante, and T. Conway, "Analysis of the Cyber Attack on the Ukrainian Power Grid -Defense Use Case," in Technical Report, SANS ICS, March 2016.
- R. M. Lee, M. J. Assante, and T. Conway, "ICS CP/PE (Cyber-to- Physical or Process Effects) case study paper -German Steel Mill Cyber Attack," in Technical Report, SANS ICS, 2014.
- J. Slay and M. Miller, "Lessons Learned from the Maroochy Water Breach," in Critical Infrastructure Protection, 2008.
- R. Khan, K. McLaughlin, D. Laverty, and S. Sezer, "Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid," in ICS-CSR conference, 2016.
- J. P. Farwell and R. Rohozinski, "Stuxnet and the Future of Cyber War," in Survival, vol. 53, no. 1, pp. 2340, 2011.
- I. M. Dragomir and S. S. Iliescu, "Synchrophasors Applications in Power System Monitoring, Protection and Control," in CSCS conference, 2015.
- I. Friedberg, D. Laverty, K. McLaughlin, and P. Smith, "A cyber-physical security analysis of synchronous-islanded microgrid operation," in ICS- CSR conference, 2015.
- R. Khan, K. McLaughlin, D. Laverty, and S. Sezer, "IEEE C37.118- 2 Synchrophasor Communication Framework -Overview, Cyber Vul- nerabilities Analysis and Performance Evaluation," in 2nd International Conference on Information Systems Security and Privacy, 2016.
- Y. Wang, T. T. Gamage, and C. H. Hauser, "Security implications of transport layer protocols in power grid synchrophasor data communica- tion," IEEE Transactions on Smart Grid, 2016.
- R. Khan, K. McLaughlin, D. Laverty, and S. Sezer, "Analysis of IEEE C37.118 and IEC 61850-90-5 Synchrophasor Communication Frameworks," in IEEE Power and Energy Society -General Meeting (IEEE PES-GM 2016), July 2016.
- L. Coppolino, S. DAntonio, and L. Romano, "Exposing Vulnerabilities in Electric Power Grids: An Experimental Approach," in International Journal of Critical Infrastructure Protection vol:7(1), pp:51-60, 2014.
- S. Pal, B. Sikdar, and J. Chow, "Real-time detection of packet drop attacks on synchrophasor data," in Smart Grid Communications (Smart- GridComm), 2014 IEEE International Conference on, 2014.
- T. Morris et al., "Cybersecurity Testing of Substation Phasor Measure- ment Units and Phasor Data Concentrators," in ACM CSIIRW, 2011.
- S. Paudel, P. Smith, and T. Zseby, "Data Integrity Attacks in Smart Grid Wide Area Monitoring," in ICS-CSR conference, 2016.
- D. Shepard, T. Humphreys, and A. Fansler, "Evaluation of the Vul- nerability of Phasor Measurement Units to GPS Spoofing Attacks," in International Journal of Critical Infrastructure Protection, 2012.
- W. Young and N. G. Leveson, "An Integrated Approach to Safety and Security Based on Systems Theory," in Commun. ACM, 2014.
- T. A. Kletz, "HAZOP and HAZAN: identifying and assessing process industry hazards," in IChemE, 1999.
- G. Macher, H. Sporer, R. Berlach, E. Armengaud, and C. Kreiner, "SAHARA: A security-aware hazard and risk analysis method," in Design, Automation Test in Europe Conference Exhibition (DATE), 2015.
- M. Abomhara, M. Gerdes, and G. M. Koien, "A STRIDE-Based Threat Model for Telehealth Systems," in NISK, 2015.
- M. Howard and S. Lipner, The Security Development Lifecycle. Red- mond, WA, USA: Microsoft Press, 2006.
- I. Friedberg, K. McLaughlin, P. Smith, D. Laverty, and S. Sezer, "STPA- SafeSec: Safety and Security Analysis for Cyber-Physical Systems," in Journal of Information Security and Applications, 2016.
- A. Shostack, "Threat Modeling -Designing for Security," in Wiley, 2014.
- D. M. Laverty et al., "The OpenPMU Project: Challenges and Perspec- tives," in IEEE PES-GM, 2013.
- E. B. Fernandez, "Threat Modeling in Cyber-Physical Systems," in Dependable, Autonomic and Secure Computing conference, 2016.