Show simple item record

Security risk assessment in industrial control systems

dc.contributor.advisorStojanović, Mirjana D.
dc.contributor.otherBakmaz, Miodrag R.
dc.contributor.otherRadojičić, Valentina Dž.
dc.contributor.otherSamčović, Andreja B.
dc.contributor.otherČukalevski, Ninel V.
dc.creatorMarković-Petrović, Jasna D.
dc.date.accessioned2019-01-18T09:30:55Z
dc.date.available2019-01-18T09:30:55Z
dc.date.issued2018-09-12
dc.identifier.urihttp://eteze.bg.ac.rs/application/showtheses?thesesId=6471
dc.identifier.urihttps://fedorabg.bg.ac.rs/fedora/get/o:19201/bdef:Content/download
dc.identifier.urihttp://vbs.rs/scripts/cobiss?command=DISPLAY&base=70036&RID=512522154
dc.identifier.urihttp://nardus.mpn.gov.rs/123456789/10602
dc.description.abstractFunkcija daljinskog upravljanja industrijskim sistemom postavlja specifične zahteve za informacionu i komunikacionu infrastrukturu, koja treba da obezbedi procesiranje i siguran prenos heterogenih informacija sa različitim zahtevima za kvalitet servisa. Komunikacija se ostvaruje između centra upravljanja i objekata industrijskog sistema, kao i između distribuiranih centara upravljanja. Usvajanje otvorenih komunikacionih standarda, korišćenje otvorenih softverskih platformi, povezanost sistema upravljanja sa drugim mrežama, daljinski pristup i dostupnost tehničkih informacija su razlozi zbog kojih je informaciona i komunikaciona infrastruktura savremenih industrijskih sistema daljinskog upravljnja, a posebno SCADA (Supervisory Control and Data Acquisition) sistema podložna različitim vrstama napada. Uzimajući u obzir evidentnu potrebu za implementacijom specifičnih mehanizama zaštite u mreži industrijskih sistema daljinskog upravljanja, poželjno je da se, pri projektovanju bezbednosnih sistema i kasnije u toku eksploatacije, izvrši procena bezbednosnog rizika, sa ciljem da se odredi racionalan nivo ulaganja u zaštitu. U disertaciji je prvo utvrđen stepen degradacije ključnih performansi telekomunikacione mreže SCADA sistema, simulacijom različitih uslova distribuiranih napada kao što je napad koji prouzrokuje odbijanje servisa (DDoS – Distributed Denial of Service). Zatim su predložena dva nova metoda procene bezbednosnog rizika u slučaju DDoS napada na infrastrukturu SCADA sistema. Prvi, osnovni metod, zasniva se na analizi arhivskih podataka, a pretpostavlja proračun povrata investicija u zaštitu pomoću skupa težinskih faktora, koji kvantifikuju uslove u kojima se dogodio napad. Drugi, hibridni metod, pored analize arhivskih podataka, uzima u obzir subjektivnu ocenu stručnjaka dobijenu na osnovu odgovarajućih anketa. U zavisnosti od primene metoda predložena su dva načina izražavanja mere rizika, kvalitativno i monetarno. Na kraju su predloženi postupci cost/benefit analize za preporučenu primenu IDPS (Intrusion Detection and Prevention System) mehanizama zaštite na osnovu procenjene mere rizika. Definisanje prihvatljivog praga za povrat investicija u zaštitu omogućuje donošenje odluke o racionalnom ulaganju u bezbednost SCADA sistema. Za testiranje predloženih metoda definisane su dve studije slučaja: studija slučaja u realnom okruženju protočne hidroelektrane i studija slučaja SCADA sistema u modelovanom magistralnom gasovodu. Rezultati studija slučaja su pokazali da su metodi pogodni za identifikaciju ranjivosti (vulnerability) sistema, praktični i primenljivi u različitim industrijskim sektorima. Pored toga, pokazalo se da su metodi efikasni u proceni mere bezbednosnog rizika od infrastukturnog napada i proceni isplativosti ulaganja u poboljšanje bezbednosti infrastrukture SCADA mreža. Studija slučaja u magistralnom gasovodu pokazala je da je drugi metod primenljiv i u fazi projektovanja sistema, kada arhive sa relevantnim podacima nisu dostupne. Na kraju disertacije, na bazi rezultata istraživanja, predložene su mere za ograničavanje bezbednosnog rizika u industrijskim sistemima daljinskog upravljanja.sr
dc.description.abstractRemote control of industrial system poses specific requirements for information and communication infrastructure, which has to provide processing and secure transmission of heterogeneous information with different requirements for Quality of Service. Communication takes place between control center and industrial system devices, as well as among distributed control centers. Information and communication infrastructure of modern Supervisory Control and Data Acquisition (SCADA) systems is particularly vulnerable to different cyber security threats due to following reasons: adoption of open communication standards, use of open software platforms, connectivity with other networks, remote access, and availability of technical information. There is an evident need to implement specific security mechanisms in industrial control networks; hence, in order to determine a cost-effective level of investment, it is desirable to assess security risk during network design phase, as well as during network operation. In this thesis, we first investigate the level of network performance degradation in SCADA systems by simulation of different conditions of distributed attacks such as Distributed Denial of Service (DDoS). Further, two novel methods for security risk assessment are proposed for the case of DDoS attack on the SCADA system infrastructure. The first, basic method relies on the analysis of historical data, and assumes calculating return on security investment as a function of the set of weighting factors that quantify the attack conditions. The second, hybrid method takes into account both hictorical data and subjective assessment of experts, provided by appropriate questionnaires. Depending on method application two ways (qualitative and monetary) for expressing the risk measure are proposed. Finally, techniques of cost/benefit analysis are also proposed for recommended application of intrusion detection and prevention system, based on the assessed risk measure. Definition of acceptable threshold for return on security investment allows making decision about cost-effective level of investment in security of SCADA system. For testing of proposed risk assessment methods, two case studies are defined: the first one considers real environment of a run-off-river hydropower plant, and the second one investigates the SCADA system in a simulated main pipeline. The results of case studies have shown that proposed methods are suitable for identification of system’s vulnerability, useful and applicable in different industrial sectors. Besides, proposed methods are efficient in security risk assessment regarding infrastructure attacks as well as in analysis of investment feasibility regarding enhancement of the SCADA network infrastructure security. Case study of the main pipeline also shows that the second method is applicable in the system design phase when relevant historical data are not available.en
dc.formatapplication/pdf
dc.languagesr
dc.publisherУниверзитет у Београду, Саобраћајни факултетsr
dc.rightsAutorstvo-Nekomercijalno-Bez prerade 3.0 Srbija (CC BY-NC-ND 3.0)
dc.sourceУниверзитет у Београдуsr
dc.subjectIndustrijski sistem daljinskog upravljanja, Internet protokol, bezbednost informacija, bezbednosni rizik, upravljanje rizikom, procena rizika, odbijanje servisa, detekcija napada, prevencija napadasr
dc.subjectindustrial control system, Internet protocol, information security, security risk, risk management, risk assessment, denial of service, intrusion detection, intrusion preventionen
dc.titleProcena bezbednosnog rizika u industrijskim sistemima daljinskog upravljanjasr
dc.title.alternativeSecurity risk assessment in industrial control systemsen
dc.typePhD thesis


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record