Towards formal verification of cyber security standards

Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks. One of the challenges of implementing cyber security standards for industrial control systems is the in...

Full description

Bibliographic Details
Main Authors: Tomas Kulik, Peter Gorm Larsen
Format: Article
Language:English
Published: Ivannikov Institute for System Programming of the Russian Academy of Sciences 2018-10-01
Series:Труды Института системного программирования РАН
Subjects:
Online Access:https://ispranproceedings.elpub.ru/jour/article/view/556
id doaj-24f1fb9be5c148cf96bee63a47936a33
record_format Article
spelling doaj-24f1fb9be5c148cf96bee63a47936a332020-11-25T00:49:14Zeng Ivannikov Institute for System Programming of the Russian Academy of SciencesТруды Института системного программирования РАН2079-81562220-64262018-10-01304799410.15514/ISPRAS-2018-30(4)-5556Towards formal verification of cyber security standardsTomas Kulik0Peter Gorm Larsen1Орхусский университетОрхусский университетCyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks. One of the challenges of implementing cyber security standards for industrial control systems is the inability to verify early that they are compliant with the relevant standards. Cyber security standard compliance is also only validated and not formally verified, often not providing strong proofs of correct use of cyber security standard. In this paper, we propose an approach that uses formal analysis to achieve this. We formally define building blocks necessary to define the system formally in order to enable formal modeling of the system and carry out the analysis using the Alloy Analyzer. Our approach can be used at an early design stage, where problems are less expensive to correct, to ensure that the system has the desired security properties. We show the applicability of our approach by modeling two distinct cyber attacks and mitigations strategies used to defend against these attacks and also evaluate our approach based on its flexibility to handle and combine different aspects of the cyber security standards. We discuss the future directions of our research.https://ispranproceedings.elpub.ru/jour/article/view/556кибербезопасность, формальный анализстандарты кибербезопасности
collection DOAJ
language English
format Article
sources DOAJ
author Tomas Kulik
Peter Gorm Larsen
spellingShingle Tomas Kulik
Peter Gorm Larsen
Towards formal verification of cyber security standards
Труды Института системного программирования РАН
кибербезопасность, формальный анализ
стандарты кибербезопасности
author_facet Tomas Kulik
Peter Gorm Larsen
author_sort Tomas Kulik
title Towards formal verification of cyber security standards
title_short Towards formal verification of cyber security standards
title_full Towards formal verification of cyber security standards
title_fullStr Towards formal verification of cyber security standards
title_full_unstemmed Towards formal verification of cyber security standards
title_sort towards formal verification of cyber security standards
publisher Ivannikov Institute for System Programming of the Russian Academy of Sciences
series Труды Института системного программирования РАН
issn 2079-8156
2220-6426
publishDate 2018-10-01
description Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks. One of the challenges of implementing cyber security standards for industrial control systems is the inability to verify early that they are compliant with the relevant standards. Cyber security standard compliance is also only validated and not formally verified, often not providing strong proofs of correct use of cyber security standard. In this paper, we propose an approach that uses formal analysis to achieve this. We formally define building blocks necessary to define the system formally in order to enable formal modeling of the system and carry out the analysis using the Alloy Analyzer. Our approach can be used at an early design stage, where problems are less expensive to correct, to ensure that the system has the desired security properties. We show the applicability of our approach by modeling two distinct cyber attacks and mitigations strategies used to defend against these attacks and also evaluate our approach based on its flexibility to handle and combine different aspects of the cyber security standards. We discuss the future directions of our research.
topic кибербезопасность, формальный анализ
стандарты кибербезопасности
url https://ispranproceedings.elpub.ru/jour/article/view/556
work_keys_str_mv AT tomaskulik towardsformalverificationofcybersecuritystandards
AT petergormlarsen towardsformalverificationofcybersecuritystandards
_version_ 1725252268110905344