Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

Abstract Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal...

Full description

Bibliographic Details
Main Authors: Sabarathinam Chockalingam, Wolter Pieters, André Teixeira, Pieter van Gelder
Format: Article
Language:English
Published: SpringerOpen 2021-09-01
Series:Cybersecurity
Subjects:
Online Access:https://doi.org/10.1186/s42400-021-00086-6
id doaj-7129cecd3dd0462eb374daa0d4daba6b
record_format Article
spelling doaj-7129cecd3dd0462eb374daa0d4daba6b2021-09-05T11:24:29ZengSpringerOpenCybersecurity2523-32462021-09-014111910.1186/s42400-021-00086-6Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgatesSabarathinam Chockalingam0Wolter Pieters1André Teixeira2Pieter van Gelder3Faculty of Technology, Policy and Management, Delft University of TechnologyFaculty of Technology, Policy and Management, Delft University of TechnologyDepartment of Electrical Engineering, Uppsala UniversityFaculty of Technology, Policy and Management, Delft University of TechnologyAbstract Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused by both (intentional) attacks and (accidental) technical failures. When operators notice abnormal behaviour, they should be able to distinguish between those two causes to take appropriate measures, because for example replacing a sensor in case of intentional incorrect sensor measurements would be ineffective and would not block corresponding the attack vector. In the previous work, we developed the attack-failure distinguisher framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two causes, including the knowledge elicitation method to construct the directed acyclic graph and conditional probability tables of BN models. As a full case study of the attack-failure distinguisher framework, this paper presents a BN model constructed to distinguish between attacks and technical failures for the problem of incorrect sensor measurements in floodgates, addressing the problem of floodgate operators. We utilised experts who associate themselves with the safety and/or security community to construct the BN model and validate the qualitative part of constructed BN model. The constructed BN model is usable in water management infrastructures to distinguish between intentional attacks and accidental technical failures in case of incorrect sensor measurements. This could help to decide on appropriate response strategies and avoid further complications in case of incorrect sensor measurements.https://doi.org/10.1186/s42400-021-00086-6Bayesian networkDeMorgan modelIntentional attackProbability elicitationSafetySecurity
collection DOAJ
language English
format Article
sources DOAJ
author Sabarathinam Chockalingam
Wolter Pieters
André Teixeira
Pieter van Gelder
spellingShingle Sabarathinam Chockalingam
Wolter Pieters
André Teixeira
Pieter van Gelder
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
Cybersecurity
Bayesian network
DeMorgan model
Intentional attack
Probability elicitation
Safety
Security
author_facet Sabarathinam Chockalingam
Wolter Pieters
André Teixeira
Pieter van Gelder
author_sort Sabarathinam Chockalingam
title Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
title_short Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
title_full Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
title_fullStr Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
title_full_unstemmed Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
title_sort bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
publisher SpringerOpen
series Cybersecurity
issn 2523-3246
publishDate 2021-09-01
description Abstract Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused by both (intentional) attacks and (accidental) technical failures. When operators notice abnormal behaviour, they should be able to distinguish between those two causes to take appropriate measures, because for example replacing a sensor in case of intentional incorrect sensor measurements would be ineffective and would not block corresponding the attack vector. In the previous work, we developed the attack-failure distinguisher framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two causes, including the knowledge elicitation method to construct the directed acyclic graph and conditional probability tables of BN models. As a full case study of the attack-failure distinguisher framework, this paper presents a BN model constructed to distinguish between attacks and technical failures for the problem of incorrect sensor measurements in floodgates, addressing the problem of floodgate operators. We utilised experts who associate themselves with the safety and/or security community to construct the BN model and validate the qualitative part of constructed BN model. The constructed BN model is usable in water management infrastructures to distinguish between intentional attacks and accidental technical failures in case of incorrect sensor measurements. This could help to decide on appropriate response strategies and avoid further complications in case of incorrect sensor measurements.
topic Bayesian network
DeMorgan model
Intentional attack
Probability elicitation
Safety
Security
url https://doi.org/10.1186/s42400-021-00086-6
work_keys_str_mv AT sabarathinamchockalingam bayesiannetworkmodeltodistinguishbetweenintentionalattacksandaccidentaltechnicalfailuresacasestudyoffloodgates
AT wolterpieters bayesiannetworkmodeltodistinguishbetweenintentionalattacksandaccidentaltechnicalfailuresacasestudyoffloodgates
AT andreteixeira bayesiannetworkmodeltodistinguishbetweenintentionalattacksandaccidentaltechnicalfailuresacasestudyoffloodgates
AT pietervangelder bayesiannetworkmodeltodistinguishbetweenintentionalattacksandaccidentaltechnicalfailuresacasestudyoffloodgates
_version_ 1717814252967821312