Visible to the public Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks

TitleModels of Reliability of Fault-Tolerant Software Under Cyber-Attacks
Publication TypeConference Paper
Year of Publication2017
AuthorsPopov, P.
Conference Name2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE)
Keywordsadequate adversary model, adversary, Adversary Models, computer security, cyber-attacks, cyber-security controls, diverse software, failure regions, Fault tolerance, fault tolerant architecture, Fault tolerant systems, fault-tolerant software, Human Behavior, independent attacks, industrial control applications, industrial protection systems, Metrics, noncompromised software, on-demand software, Probabilistic logic, probabilistic model, pubcrawl, resilience, Resiliency, Scalability, security of data, Software, software fault tolerance, software fault-tolerance, software maintenance, software maintenance policies, software reliability, sophisticated synchronized attacks, synchronized attacks system reliability, telecommunication security
Abstract

This paper offers a new approach to modelling the effect of cyber-attacks on reliability of software used in industrial control applications. The model is based on the view that successful cyber-attacks introduce failure regions, which are not present in non-compromised software. The model is then extended to cover a fault tolerant architecture, such as the 1-out-of-2 software, popular for building industrial protection systems. The model is used to study the effectiveness of software maintenance policies such as patching and "cleansing" ("proactive recovery") under different adversary models ranging from independent attacks to sophisticated synchronized attacks on the channels. We demonstrate that the effect of attacks on reliability of diverse software significantly depends on the adversary model. Under synchronized attacks system reliability may be more than an order of magnitude worse than under independent attacks on the channels. These findings, although not surprising, highlight the importance of using an adequate adversary model in the assessment of how effective various cyber-security controls are.

URLhttp://ieeexplore.ieee.org/document/8109089/
DOI10.1109/ISSRE.2017.23
Citation Keypopov_models_2017