STRIDE-based threat modeling and DREAD evaluation for the distributed control system in the oil refinery

Kyoung Ho Kim, Kyounggon Kim, Huy Kang Kim

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Industrial control systems (ICSs) used to be operated in closed networks, that is, separated physically from the Internet and corporate networks, and independent protocols were used for each manufacturer. Thus, their operation was relatively safe from cyberattacks. However, with advances in recent technologies, such as big data and internet of things, companies have been trying to use data generated from the ICS environment to improve production yield and minimize process downtime. Thus, ICSs are being connected to the internet or corporate networks. These changes have increased the frequency of attacks on ICSs. Despite this increased cybersecurity risk, research on ICS security remains insufficient. In this paper, we analyze threats in detail using STRIDE threat analysis modeling and DREAD evaluation for distributed control systems, a type of ICSs, based on our work experience as cybersecurity specialists at a refinery. Furthermore, we verify the validity of threats identified using STRIDE through case studies of major ICS cybersecurity incidents: Stuxnet, BlackEnergy 3, and Triton. Finally, we present countermeasures and strategies to improve risk assessment of identified threats.

Original languageEnglish
Pages (from-to)991-1003
Number of pages13
JournalETRI Journal
Volume44
Issue number6
DOIs
Publication statusPublished - 2022 Dec

Keywords

  • DREAD
  • STRIDE
  • countermeasures
  • distributed control system (DCS)
  • industrial control system (ICS)
  • network
  • operation technology (OT)
  • threat modeling

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Computer Science(all)
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'STRIDE-based threat modeling and DREAD evaluation for the distributed control system in the oil refinery'. Together they form a unique fingerprint.

Cite this