Visible to the public A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems

TitleA Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems
Publication TypeConference Paper
Year of Publication2018
AuthorsKawanishi, Y., Nishihara, H., Souma, D., Yoshida, H., Hata, Y.
Conference Name2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
Date Publishedaug
ISBN Number978-1-5386-7518-2
KeywordsAutomotive engineering, automotive-security guideline, Autonomic Security, big data security, composability, control devices, control engineering computing, control systems, CVSS, CWSS, data logger, data loggers, ICS risk assessment, industrial control, industrial control systems, integrated circuits, JASO TP15002, manufacturing systems, Measurement, Metrics, Pervasive Computing Security, production engineering computing, pubcrawl, quantitative risk assessment, quantitative risk assessment methods, resilience, Resiliency, risk management, risk scoring systems, risk-score dispersion, SCADA(Supervisory Control and Data Acquisition), security, security design, security of data, security threats, Terms—industrial control systems (ICS), three-phase risk assessment method
Abstract

In recent years, there has been progress in applying information technology to industrial control systems (ICS), which is expected to make the development cost of control devices and systems lower. On the other hand, the security threats are becoming important problems. In 2017, a command injection issue on a data logger was reported. In this paper, we focus on the risk assessment in security design for data loggers used in industrial control systems. Our aim is to provide a risk assessment method optimized for control devices and systems in such a way that one can prioritize threats more preciously, that would lead work resource (time and budget) can be assigned for more important threats than others. We discuss problems with application of the automotive-security guideline of JASO TP15002 to ICS risk assessment. Consequently, we propose a three-phase risk assessment method with a novel Risk Scoring Systems (RSS) for quantitative risk assessment, RSS-CWSS. The idea behind this method is to apply CWSS scoring systems to RSS by fixing values for some of CWSS metrics, considering what the designers can evaluate during the concept phase. Our case study with ICS employing a data logger clarifies that RSS-CWSS can offer an interesting property that it has better risk-score dispersion than the TP15002-specified RSS.

URLhttps://ieeexplore.ieee.org/document/8511868
DOI10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00025
Citation Keykawanishi_study_2018