Towards formal verification of cyber security standards
Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks. One of the challenges of implementing cyber security standards for industrial control systems is the in...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ivannikov Institute for System Programming of the Russian Academy of Sciences
2018-10-01
|
Series: | Труды Института системного программирования РАН |
Subjects: | |
Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/556 |
id |
doaj-24f1fb9be5c148cf96bee63a47936a33 |
---|---|
record_format |
Article |
spelling |
doaj-24f1fb9be5c148cf96bee63a47936a332020-11-25T00:49:14Zeng Ivannikov Institute for System Programming of the Russian Academy of SciencesТруды Института системного программирования РАН2079-81562220-64262018-10-01304799410.15514/ISPRAS-2018-30(4)-5556Towards formal verification of cyber security standardsTomas Kulik0Peter Gorm Larsen1Орхусский университетОрхусский университетCyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks. One of the challenges of implementing cyber security standards for industrial control systems is the inability to verify early that they are compliant with the relevant standards. Cyber security standard compliance is also only validated and not formally verified, often not providing strong proofs of correct use of cyber security standard. In this paper, we propose an approach that uses formal analysis to achieve this. We formally define building blocks necessary to define the system formally in order to enable formal modeling of the system and carry out the analysis using the Alloy Analyzer. Our approach can be used at an early design stage, where problems are less expensive to correct, to ensure that the system has the desired security properties. We show the applicability of our approach by modeling two distinct cyber attacks and mitigations strategies used to defend against these attacks and also evaluate our approach based on its flexibility to handle and combine different aspects of the cyber security standards. We discuss the future directions of our research.https://ispranproceedings.elpub.ru/jour/article/view/556кибербезопасность, формальный анализстандарты кибербезопасности |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Tomas Kulik Peter Gorm Larsen |
spellingShingle |
Tomas Kulik Peter Gorm Larsen Towards formal verification of cyber security standards Труды Института системного программирования РАН кибербезопасность, формальный анализ стандарты кибербезопасности |
author_facet |
Tomas Kulik Peter Gorm Larsen |
author_sort |
Tomas Kulik |
title |
Towards formal verification of cyber security standards |
title_short |
Towards formal verification of cyber security standards |
title_full |
Towards formal verification of cyber security standards |
title_fullStr |
Towards formal verification of cyber security standards |
title_full_unstemmed |
Towards formal verification of cyber security standards |
title_sort |
towards formal verification of cyber security standards |
publisher |
Ivannikov Institute for System Programming of the Russian Academy of Sciences |
series |
Труды Института системного программирования РАН |
issn |
2079-8156 2220-6426 |
publishDate |
2018-10-01 |
description |
Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks. One of the challenges of implementing cyber security standards for industrial control systems is the inability to verify early that they are compliant with the relevant standards. Cyber security standard compliance is also only validated and not formally verified, often not providing strong proofs of correct use of cyber security standard. In this paper, we propose an approach that uses formal analysis to achieve this. We formally define building blocks necessary to define the system formally in order to enable formal modeling of the system and carry out the analysis using the Alloy Analyzer. Our approach can be used at an early design stage, where problems are less expensive to correct, to ensure that the system has the desired security properties. We show the applicability of our approach by modeling two distinct cyber attacks and mitigations strategies used to defend against these attacks and also evaluate our approach based on its flexibility to handle and combine different aspects of the cyber security standards. We discuss the future directions of our research. |
topic |
кибербезопасность, формальный анализ стандарты кибербезопасности |
url |
https://ispranproceedings.elpub.ru/jour/article/view/556 |
work_keys_str_mv |
AT tomaskulik towardsformalverificationofcybersecuritystandards AT petergormlarsen towardsformalverificationofcybersecuritystandards |
_version_ |
1725252268110905344 |