TY - JOUR
T1 - STRIDE-based threat modeling and DREAD evaluation for the distributed control system in the oil refinery
AU - Kim, Kyoung Ho
AU - Kim, Kyounggon
AU - Kim, Huy Kang
N1 - Funding Information:
This research was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. 2021‐0‐00624, Development of Intelligence Cyber Attack and Defense Analysis Framework for Increasing Security Level of C‐ITS) and Security Research Center of Naif Arab University for Security Sciences, under grant agreement No. SRC‐PR2‐05.
Publisher Copyright:
1225-6463/$ © 2021 ETRI.
PY - 2022/12
Y1 - 2022/12
N2 - Industrial control systems (ICSs) used to be operated in closed networks, that is, separated physically from the Internet and corporate networks, and independent protocols were used for each manufacturer. Thus, their operation was relatively safe from cyberattacks. However, with advances in recent technologies, such as big data and internet of things, companies have been trying to use data generated from the ICS environment to improve production yield and minimize process downtime. Thus, ICSs are being connected to the internet or corporate networks. These changes have increased the frequency of attacks on ICSs. Despite this increased cybersecurity risk, research on ICS security remains insufficient. In this paper, we analyze threats in detail using STRIDE threat analysis modeling and DREAD evaluation for distributed control systems, a type of ICSs, based on our work experience as cybersecurity specialists at a refinery. Furthermore, we verify the validity of threats identified using STRIDE through case studies of major ICS cybersecurity incidents: Stuxnet, BlackEnergy 3, and Triton. Finally, we present countermeasures and strategies to improve risk assessment of identified threats.
AB - Industrial control systems (ICSs) used to be operated in closed networks, that is, separated physically from the Internet and corporate networks, and independent protocols were used for each manufacturer. Thus, their operation was relatively safe from cyberattacks. However, with advances in recent technologies, such as big data and internet of things, companies have been trying to use data generated from the ICS environment to improve production yield and minimize process downtime. Thus, ICSs are being connected to the internet or corporate networks. These changes have increased the frequency of attacks on ICSs. Despite this increased cybersecurity risk, research on ICS security remains insufficient. In this paper, we analyze threats in detail using STRIDE threat analysis modeling and DREAD evaluation for distributed control systems, a type of ICSs, based on our work experience as cybersecurity specialists at a refinery. Furthermore, we verify the validity of threats identified using STRIDE through case studies of major ICS cybersecurity incidents: Stuxnet, BlackEnergy 3, and Triton. Finally, we present countermeasures and strategies to improve risk assessment of identified threats.
KW - DREAD
KW - STRIDE
KW - countermeasures
KW - distributed control system (DCS)
KW - industrial control system (ICS)
KW - network
KW - operation technology (OT)
KW - threat modeling
UR - http://www.scopus.com/inward/record.url?scp=85141462139&partnerID=8YFLogxK
U2 - 10.4218/etrij.2021-0181
DO - 10.4218/etrij.2021-0181
M3 - Article
AN - SCOPUS:85141462139
SN - 1225-6463
VL - 44
SP - 991
EP - 1003
JO - ETRI Journal
JF - ETRI Journal
IS - 6
ER -