IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v94y2009i9p1394-1402.html
   My bibliography  Save this article

Integrating cyber attacks within fault trees

Author

Listed:
  • Nai Fovino, Igor
  • Masera, Marcelo
  • De Cian, Alessio

Abstract

In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

Suggested Citation

  • Nai Fovino, Igor & Masera, Marcelo & De Cian, Alessio, 2009. "Integrating cyber attacks within fault trees," Reliability Engineering and System Safety, Elsevier, vol. 94(9), pages 1394-1402.
  • Handle: RePEc:eee:reensy:v:94:y:2009:i:9:p:1394-1402
    DOI: 10.1016/j.ress.2009.02.020
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832009000337
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2009.02.020?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Huitsing, Peter & Chandia, Rodrigo & Papa, Mauricio & Shenoi, Sujeet, 2008. "Attack taxonomies for the Modbus protocols," International Journal of Critical Infrastructure Protection, Elsevier, vol. 1(C), pages 37-44.
    2. Aven, Terje, 2007. "A unified framework for risk and vulnerability analysis covering both safety and security," Reliability Engineering and System Safety, Elsevier, vol. 92(6), pages 745-754.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Kriaa, Siwar & Pietre-Cambacedes, Ludovic & Bouissou, Marc & Halgand, Yoran, 2015. "A survey of approaches combining safety and security for industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 139(C), pages 156-178.
    2. SICARD, Franck & ZAMAI, Éric & FLAUS, Jean-Marie, 2019. "An approach based on behavioral models and critical states distance notion for improving cybersecurity of industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 584-603.
    3. Han, Sang Min & Lee, Chanyoung & Seong, Poong Hyun, 2022. "Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis," International Journal of Critical Infrastructure Protection, Elsevier, vol. 37(C).
    4. Georgios Kavallieratos & Sokratis Katsikas & Vasileios Gkioulos, 2020. "Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey," Future Internet, MDPI, vol. 12(4), pages 1-17, April.
    5. Wang, Wei & Cammi, Antonio & Di Maio, Francesco & Lorenzi, Stefano & Zio, Enrico, 2018. "A Monte Carlo-based exploration framework for identifying components vulnerable to cyber threats in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 24-37.
    6. Piètre-Cambacédès, L. & Bouissou, M., 2013. "Cross-fertilization between safety and security engineering," Reliability Engineering and System Safety, Elsevier, vol. 110(C), pages 110-126.
    7. Rick A. Jones & Barry Horowitz, 2012. "A System‐Aware Cyber Security architecture," Systems Engineering, John Wiley & Sons, vol. 15(2), pages 225-240, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Johansson, Jonas & Hassel, Henrik, 2010. "An approach for modelling interdependent infrastructures in the context of vulnerability analysis," Reliability Engineering and System Safety, Elsevier, vol. 95(12), pages 1335-1344.
    2. Aven, Terje, 2010. "Some reflections on uncertainty analysis and management," Reliability Engineering and System Safety, Elsevier, vol. 95(3), pages 195-201.
    3. Monzer, Mohamad-Houssein & Beydoun, Kamal & Ghaith, Alaa & Flaus, Jean-Marie, 2022. "Model-based IDS design for ICSs," Reliability Engineering and System Safety, Elsevier, vol. 225(C).
    4. Annika Djurle & Beth Young & Anna Berlin & Ivar Vågsholm & Anne-Lie Blomström & Jim Nygren & Anders Kvarnheden, 2022. "Addressing biohazards to food security in primary production," Food Security: The Science, Sociology and Economics of Food Production and Access to Food, Springer;The International Society for Plant Pathology, vol. 14(6), pages 1475-1497, December.
    5. Cagno, Enrico & De Ambroggi, Massimiliano & Grande, Ottavio & Trucco, Paolo, 2011. "Risk analysis of underground infrastructures in urban areas," Reliability Engineering and System Safety, Elsevier, vol. 96(1), pages 139-148.
    6. Ghaleb, Asem & Zhioua, Sami & Almulhem, Ahmad, 2018. "On PLC network security," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 62-69.
    7. Rodofile, Nicholas R. & Radke, Kenneth & Foo, Ernest, 2019. "Extending the cyber-attack landscape for SCADA-based critical infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 25(C), pages 14-35.
    8. Aven, Terje, 2013. "A conceptual framework for linking risk and the elements of the data–information–knowledge–wisdom (DIKW) hierarchy," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 30-36.
    9. Terje Aven & Ortwin Renn, 2015. "An Evaluation of the Treatment of Risk and Uncertainties in the IPCC Reports on Climate Change," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 701-712, April.
    10. Scholz, Roland W. & Czichos, Reiner & Parycek, Peter & Lampoltshammer, Thomas J., 2020. "Organizational vulnerability of digital threats: A first validation of an assessment method," European Journal of Operational Research, Elsevier, vol. 282(2), pages 627-643.
    11. Aven, Terje, 2013. "Practical implications of the new risk perspectives," Reliability Engineering and System Safety, Elsevier, vol. 115(C), pages 136-145.
    12. Tang, Yang & Liu, Qingyou & Jing, Jiajia & Yang, Yan & Zou, Zhengwei, 2017. "A framework for identification of maintenance significant items in reliability centered maintenance," Energy, Elsevier, vol. 118(C), pages 1295-1303.
    13. Alexandros Korkovelos & Dimitrios Mentis & Morgan Bazilian & Mark Howells & Anwar Saraj & Sulaiman Fayez Hotaki & Fanny Missfeldt-Ringius, 2020. "Supporting Electrification Policy in Fragile States: A Conflict-Adjusted Geospatial Least Cost Approach for Afghanistan," Sustainability, MDPI, vol. 12(3), pages 1-34, January.
    14. Rahman, Ayesha & Mustafa, Ghulam & Khan, Abdul Qayyum & Abid, Muhammad & Durad, Muhammad Hanif, 2022. "Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms," International Journal of Critical Infrastructure Protection, Elsevier, vol. 39(C).
    15. Cheng-Hui Chou & Chi-Che Wu & Kuan-Chu Lu & I-Hsien Liu & Tien-Hsiang Chang & Chu-Fen Li & Jung-Shian Li, 2018. "Modbus Packet Analysis and Attack Mode for SCADA System," Journal of ICT, Design, Engineering and Technological Science, Juhriyansyah Dalle, vol. 2(2), pages 30-35.
    16. Alvaro Llaria & Jessye Dos Santos & Guillaume Terrasson & Zina Boussaada & Christophe Merlo & Octavian Curea, 2021. "Intelligent Buildings in Smart Grids: A Survey on Security and Privacy Issues Related to Energy Management," Energies, MDPI, vol. 14(9), pages 1-37, May.
    17. Yampolskiy, Mark & Skjellum, Anthony & Kretzschmar, Michael & Overfelt, Ruel A. & Sloan, Kenneth R. & Yasinsac, Alec, 2016. "Using 3D printers as weapons," International Journal of Critical Infrastructure Protection, Elsevier, vol. 14(C), pages 58-71.
    18. Marroni, Giulia & Casini, Leonardo & Bartolucci, Andrea & Kuipers, Sanneke & Casson Moreno, Valeria & Landucci, Gabriele, 2024. "Development of fragility models for process equipment affected by physical security attacks," Reliability Engineering and System Safety, Elsevier, vol. 243(C).
    19. Reniers, Genserik & Soudan, Karel, 2010. "A game-theoretical approach for reciprocal security-related prevention investment decisions," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 1-9.
    20. Morgan Bazilian & Debabrata Chattopadhyay, 2015. "Considering Power System Planning in Fragile and Conflict States," Cambridge Working Papers in Economics 1530, Faculty of Economics, University of Cambridge.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:94:y:2009:i:9:p:1394-1402. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.