The Bayesian Network Methodology for Industrial Control System with Digital Technology



Similar documents
How To Write A Cyber Security Risk Analysis Model For Research Reactor

Defense in Depth Architecture of Server Systems for the Improvement of Cyber Security

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)

University Dedicated Next Generation ERP System

Studying an Edutainment Applying Information Security Damage Cases for Adolescents

Development and Application of POSAFE-Q PLC Platform

An Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology

Lecture Notes in Computer Science: Media-Oriented Service Overlay Network Architecture over Future Internet Research for Sustainable Testbed

A Study of Design Measure for Minimizing Security Vulnerability in Developing Virtualization Software

The study on the necessity of online safety education software development for research staff

A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

Research Institute (KAERI) Daedeok-daero, Yuseong-gu, Daejeon, Republic of Korea

Procedia Computer Science

A Digital Door Lock System for the Internet of Things with Improved Security and Usability

Vibration Measurement of Wireless Sensor Nodes for Structural Health Monitoring

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis

Success factors for the implementation of ERP to the Agricultural Products Processing Center

Effects of Simulation based Training on the Learning Outcome of Nursing Students

Research and Performance Analysis of HTML5 WebSocket for a Real-time Multimedia Data Communication Environment

AN APPLICATION STUDY FOR THE CLASS IE DIGITAL CONTROL AND

INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS

Intelligent Decision Support System (DSS) Software for System Operation and Multiple Water Resources Blending in Water Treatment Facilities

Security Threats on National Defense ICT based on IoT

Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver

A Design of Access Control Framework for User Identification Based on Personal Cloud

Concept Design of Testbed based on Cloud Computing for Security Research

Design of automatic testing tool for railway signalling systems software safety assessment

Estimating Software Reliability In the Absence of Data

Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices

Efficient Data Replication Scheme based on Hadoop Distributed File System

A Study on UNIX Server Consolidation by Virtualization

Estimation Model of labor Time at the Information Security Audit and Standardization of Audit Work by Probabilistic Risk Assessment

A Research on Security Awareness and Countermeasures for the Single Server

A Mobile Application for Information Sharing and Collaboration among Co-located People

PROJECT RISK MANAGEMENT

MVC Architecture Driven Design and Implementation of Java Framework for Developing Desktop Application

A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards

Effects of Blended Learning on Nursing Students Learning Outcomes

Effective Use of Android Sensors Based on Visualization of Sensor Information

ESKISP Manage security testing

Effects of Emergency Nursing Simulation-based Education Program for Self-directed learning ability and Confidence in performance

Modern Accounting Information System Security (AISS) Research Based on IT Technology

DETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS

Bayesian Networks and Classifiers in Project Management

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

Mathematical models to estimate the quality of monitoring software systems for electrical substations

Security Assessment through Google Tools -Focusing on the Korea University Website

Quantification of Security and Survivability

A study of Clinical Nurses knowledge about Critical Practice Guideline for Diabetes Mellitus 1

The Digital Signage System Supporting Multi-Resources Schedule on an Elevator

Flood inundation prediction model on spatial characteristics with utilization of OLAP-based multidimensional cube information

An Analysis on the Factors affecting Standardization of e-government System Development and Management Methodology 1

Options for Cyber Security. Reactors. April 9, 2015

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Chapter 14 Managing Operational Risks with Bayesian Networks

Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants

Developing a Video-based Smart Mastery Learning through Adaptive Evaluation

IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER NETWORKS. Received May 2010; accepted July 2010

Cyber Security in a Nuclear Context

The Stock Trading System Using X-DBaaS in Cloud Environment

Supporting Collaborative Video Editing Over Cloud Storage

Hazard Identification and Risk Assessment in Foundry

Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service

A Blended Learning Approach to an Assignmentintensive

A Study on Problem Solving Ability of Nursing Students

A Critical Juncture and an Emerging New Paradigm of Health Insurance Policy in Korea: A Theoretical Review

The Study on the Graphic Design of Media art: Focusing on Projection Mapping

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment

On site big data analysis system model to promote the competiveness of manufacturing enterprises

Radiated emission measurement of a cell phone processor module using TEM cell

Towards Building File Sharing and Adaptation Service for Advanced Collaborating Environment

A Study on User Access Control Method using Multi-Factor Authentication for EDMS

A Study on Power Generation Analysis of Floating PV System Considering Environmental Impact

A Study on the Dos Prevention System for SPT-based Sync Flooding Protection

COMPUTER SECURITY OF INSTRUMENTATION AND CONTROL SYSTEMS AT NUCLEAR FACILITIES

Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications

Formal Modelling of Network Security Properties (Extended Abstract)

Nuclear Plant Information Security A Management Overview

Information Technology Plan 2013 of Korea University

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

Integration of Hadoop Cluster Prototype and Analysis Software for SMB

Fault Analysis in Software with the Data Interaction of Classes

Safety Analysis for Nuclear Power Plants

Techniques for Supporting Prediction of Security Breaches in. Critical Cloud Infrastructures Using Bayesian Network and. Markov Decision Process

A Study on Information Technology Plan and Status of University 2013

Education for Job Performance and Attitude of Receptionists in General Hospital Front Desk

Component Based Development for Mobile Enterprise Application

Information Security Risk Management

Lumension Endpoint Management and Security Suite

N.K. Srivastava GM-R&M-Engg.Services NTPC- CC/Noida

Design of Expanded Assessment Management System for Open-Source Moodle LMS Module

Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements

Transcription:

, pp.157-161 http://dx.doi.org/10.14257/astl.2013.42.37 The Bayesian Network Methodology for Industrial Control System with Digital Technology Jinsoo Shin 1, Hanseong Son 2, Soongohn Kim 2, and Gyunyoung Heo 1 1 Kyung Hee University, 1732 Deogyeong-daero, Giheung-gu, Yongin-si, Gyeonggi-do 446-701, Republic of Korea {bigjoyan, gheo}@khu.ac.kr 2 Joongbu University, 201 Daehak-ro,Chubu-Myeon, Geumsan-gun, Chungnam, 312-702, Republic of Korea {hsson, sgkim}@joongbu.ac.kr *Corresponding Author: hsson@joongbu.ac.kr Abstract. Issues like cost optimization, system safety and cyber-attack are newly introduced due to development in technology. Although sufficient information is required to solve these mentioned issues, generally there is lack of information. We introduce the Bayesian network that is one of the most popular probabilistic methodologies to overcome the limitation of the issues. This paper presents two Bayesian network models related to system optimization and cyber security for specific industry control system to prepare the mobile environment. Keywords: Bayesian network; System Optimization; Cyber Security 1 Introduction Industries or workers have been greatly influenced by the development of technology related to mobile systems such as personal digital assistant (PDA), mobile phone and laptop. The characteristic of mobile device provides mobility and spacious working environment to users by using it [1-2]. There are a few common concerns between nuclear industry and mobile device such as standardization and cost optimization with advent of new technology, safety and cyber threats. Cost optimization is important from business point of view and has equal importance in both industries. In nuclear safety, one is particularly interested in the safety of critical assets and safe operation to keep public, worker and environment safe from hazardous radiation. Using the devices based on digital technology can introduce issues such as cyber security to industrial system, especially critical infrastructure like nuclear power plant. The system optimization issue is to find out the optimal configuration of the system, caused by modernization from analog to digital system or changing the system configuration, by comparison reliability of system with cost of system. The cyber security is very important issue on industrial facilities, especially critical infrastructure control system, because it is hazardous to the public safety as well as the finance loss. We need sufficient information to solve these issues, but generally ISSN: 2287-1233 ASTL Copyright 2013 SERSC

there is lack of information since it is difficult to perform the penetration test for the critical infrastructure control system. In order to overcome these problems, we introduce the Bayesian network methodology which is one of the most popular probabilistic methodologies based on Bayesian theory (in Chapter 2). The problem about lack of information can be overcome by using Bayesian network (BN). In this paper, we propose two models used the BN to represent that the BN methodology can be applied to these issues (in Chapter 3). One is the optimization model by using the BN to find out the optimal point between reliability and cost of system. And other is the cyber security evaluation model to find out vulnerability and optimal mitigation measure of cyber threat. 2 Bayesian Network (BN) Bayesian network (BN) is a directed acyclic graph (DAG) of arc to represent the dependencies between nodes, which represent the variables, using the Bayesian theory. BN is composed of node, arc and node probability table (NPT) [3]. The node is a variable, the arc represents the cause-and-effect relationship and NPT means the probability table that summarizes the occur probability between the causal relationship nodes. BN methodology can solve problems such as lack of information, posterior inference and changing from the qualitative to quantitative problem by learning new information on the conditional probability with calculation of the relationship between the posterior and prior probability. 3 Modeling by using BN In Chapter 3, we propose two represent models to find out optimal system configuration, and measure of vulnerability and optimal mitigation for cyber-attacks caused by mobile device, which applies to industrial control system (ICS) with BN for solving the lack of information issue or cyber security issue. In this paper, the subject of application is restricted to an ICS of critical infrastructure like nuclear reactor protection system (RPS). RPS in nuclear industry is important to retain the safety state when abnormal state since an accident occurs to a nuclear facility. Then, two models are developed by using BN. These models are significant with the introduction of digital, like mobile, I&C system. 3.1 Optimal Model for RPS Architecture To find out optimal configuration of system, we make several configuration of nuclear reactor protection system (RPS) as one of ICS and an optimization model to determine optimal instrumentation and control (I&C) architecture configuration in terms of availability and cost. The four cases with different architecture formation for RPS were developed with single and double redundancy of bi-stable modules, coincidence processor module, and safety or 158 Copyright 2013 SERSC

protection circuit actuation logic. The architecture configurations are transformed to reliability block diagram based on logical operation and function of modules. The BN models for four configurations were developed to get the availability analysis by using AND gate, OR gate and N-out-of-M gate as BN functions [4]. Cost estimation model was proposed for the architecture configurations, respectively. The BN model can be used to calculate the system reliability. For cost estimation, a numeric multiplier of X arbitrary units was assigned to each component based on experts and designers judgment and cost for each configuration was calculated. Reliability index, which means the increase of reliability per unit of cost, is proposed by calculation of cost and availability with each configuration and a configuration of architecture that gives highest availability with maintaining low cost of manufacturing can be identified. It was found that reliability can be enhanced at the rate of 5E -05 per X unit of cost for this study. 3.2 Cyber Security Risk Model for RPS Architecture Mobile like PDA, mobile phone and laptop technology give usability to user during maintain period of component, device and system. The cyber-attack is emphasized as new critical threat caused by applying digital device into ICS. Cyber security against cyber-attack is difficult to analysis and modelling due to lack of information like penetration test data. We suggest the cyber security risk model for RPS I&C system with the BN, it is shown in Fig. 1, to overcome these problems by calculating of the relationship between the posterior and prior probability [5-6]. The model utilizing the benefit of BN can analyze the risk that cyber-attack occurs at RPS. It can be utilized for the quantitative analysis by the proposed measure, cyber security risk as well as for various qualitative analyses. Cyber security risk model is composed of the activityquality analysis model and the architecture analysis model. The activity-quality analysis model was proposed to check how people and/or organization comply with the cyber security regulatory guide. It helps to analyze the relationships of the activity-quality checklists and their influences to cyber security. The architecture analysis model was also developed for the RPS as an illustrative purpose. For the definition of the critical cyber-attack scenarios on RPS of nuclear industry, the vulnerabilities and mitigation measures were analyzed. Then, the two models, activity-quality and architecture analysis models, were integrated to cyber security risk model by using BN. Then, several analyses were performed by using the cyber security risk model for confirming the model. The analysis of the vulnerability and optimal mitigation measure against the vulnerability was performed with the assumption that a cyber-attack occurs to a maintenance and test processor in the RPS. In this analysis, prioritizing the order of vulnerabilities and reinforcing the mitigation measures were analyzed with the assumed cyber-attack to maintenance and test processor. If a cyberattack occurs at a system scale, it is important to have confidence on which component is the key element corresponding to the attack situation. This analysis proved that the developed model could provide this kind of information Copyright 2013 SERSC 159

through the back propagation feature of the BN such as that Coincidence Processor and Intra-Channel are more risk significant than other subsystems of RPS and prioritized vulnerabilities order for RPS. Finally, the analysis of the cyber security risk and the optimal mitigation measures regarding vulnerabilities was performed on RPS. This analysis infers that the use of the cyber security risk model makes it possible to create simulated penetration test scenarios for future directions. Activityquality Mitigation Measure Vulnerability Architecture Component Cause Situation Accident Case Cyber Security Risk Fig. 1. The simplified cyber security risk model for RPS with Bayesian network 4 Conclusions For preparing the introduction of the latest devices based on digital interface like mobile on critical infrastructure facilities, we suggest the BN methodology and the two models based on the methodology to demonstrate the usefulness of the BN for specific ICSs. One is the model for the optimization of system configuration in view of reliability and cost. This model was developed for RPS and demonstrated the usefulness of the BN. Using this model, we could find out an optimal configuration by analyzing the reliability and cost of each changing configuration. The other is the cyber security evaluation model, which is also based on the BN, to analyze the vulnerabilities and the optimal mitigation measures for RPS architecture. The model found out the critical vulnerabilities and the optimal mitigation measures against the vulnerabilities for several assumed scenarios by using the BN function of back propagation calculation. The studies using these two models infer that the BN methodology can be applied to other systems like mobile systems for the same purposes. References 1. Lee, H.C., Lee G.B.: Prototype of Operator Interface for Monitoring and Controlling in the Mobile Control Room. Proceedings of the 2013 ACM international conference on interactive tabletops and surfaces, pp 305-308 (2013) 2. Kai Ji, Tian-Jian Li: Detection and Analysis of Unidirectional Licks in Mobile Ad Hoc Network Under Nuclear Power Plants Environment. Emerging Technologies for Information Systems, Computing, and Management Lecture Notes in Electrical Engineering Volume 236, pp 871-878 (2013) 3. Heckerman, D.: A tutorial on learning with Bayesian networks (1996) 160 Copyright 2013 SERSC

4. Rahman, K., Shin, J.S., Heo, G.Y., Son, H.S.: Reliability Analysis of I&C Architecture of Research Reactors Using Bayesian Networks, Korean Nuclear Society Autumn Meeting (2013) 5. Shin, J.S., Son, H.S., Rahman, K., Heo, G.Y.: Development of Cyber Security Evaluation Model Using Bayesian Networks, Reliability Engineering and System Safety (submission, 2013) 6. Shin, J.S., Son, H.S., and Heo, G.Y.: Cyber Security Risk Analysis Model Composed with Activity-quality and Architecture Model. International Conference on Computer, Networks and Communication Engineering, p. 609-612 (2013) Copyright 2013 SERSC 161