Intelligent Risk-Based Cybersecurity Protection for Industrial Systems Control—A Feasibility Study

Author:

Houmb S. H.1ORCID,Iversen F.2ORCID,Ewald R.3ORCID,Færaas E.4ORCID

Affiliation:

1. NTNU

2. NORCE (Corresponding author)

3. NORCE

4. Equinor ASA

Abstract

Summary Intelligent automated industrial process control, enabled by IR 4.0 technology, requires increased system integration and connectedness. With such development comes a heightened risk of cyberattack for operational technology (OT) systems, including industrial control systems (ICS) and industrial automation and control systems (IACS), historically shielded from cyberspace. Cyberattacks on OT systems can also impact the physical world. The recent attack on the US Colonial Pipeline interrupted delivery of oil along the US West coast for several days, resulting in a declaration of a state of emergency, while the Ukraine power grid attacks interrupted electrical power supply in Kyiv, impacting thousands of consumers. In 2021, an Equinor-operated platform on the Norwegian Continental shelf was hit by malware. The incident had the potential to affect the drilling control system (DCS). For ICS, the concern is ensuring a safe process, as opposed to the more traditional concern with data protection for information technology (IT) system management. To ensure safe implementation of advanced industrial systems control, while avoiding unnecessary operational downtime, there is a need for cybersecurity solutions that account for risk for the whole cyberphysical system (CPS), including the ICS, the work environment, the product, and the physical surroundings. Diagnostic models and methods must therefore be developed that cover the functionality of the whole CPS. Further, to account for process dynamics and evolving cyberattack threats, adaptability is required with respect to both process state and new types of attacks. For this purpose, knowledge-based awareness monitoring combined with existing cyberattack detection tools for ICS, known as ICS intrusion detection systems (IDS), is proposed, providing an element of artificial intelligence. Results from studies in a DCS environment indicate that existing monitoring applications can be used to detect and discern between different types of cyberattacks on CPSs. This indicates feasibility with respect to monitoring the control and IT components of the ICS system for building risk-based cybersecurity decision support solutions. The key challenge and novelty of the proposed approach is to extend the capability of cybermonitoring in systems control to automated evaluation of process risk, including risk to the physical environment. Such capability will enable appropriate decision support with respect to both process risk and operational downtime.

Publisher

Society of Petroleum Engineers (SPE)

Subject

Geotechnical Engineering and Engineering Geology,Energy Engineering and Power Technology

Reference30 articles.

1. Assante, M. J. and Lee, R. M. 2015. The Industrial Control System Cyber Kill Chain. SANS Institute. https://sansorg.egnyte.com/dl/HHa9fCekmc.

2. Barrett, M . 2018. Framework for Improving Critical Infrastructure Cybersecurity Version 1.1. NIST Cybersecurity Framework. https://doi.org/10.6028/NIST.CSWP.04162018.

3. Beyond the Pyramid: Using ISA95 for IR 4.0 and Smart Manufacturing;Brandl;InTech Mag,2021

4. Favilla, J., Lin, S., and Sávio, M. 2022. Manufacturing 4.0: From Data to Decisions. IBM. https://www.ibm.com/thought-leadership/institute-business-value/report/manufacturing-4-0.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3