Using a system-theoretic approach to identify cyber- vulnerabilities and mitigations in industrial control systems

Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019

Bibliographic Details
Main Author: Khan, Shaharyar,S.M.Massachusetts Institute of Technology.
Other Authors: Stuart Madnick and Allen Moulton.
Format: Thesis
Language:eng
Published: Massachusetts Institute of Technology 2019
Subjects:
Online Access:https://hdl.handle.net/1721.1/122437
_version_ 1826216041326313472
author Khan, Shaharyar,S.M.Massachusetts Institute of Technology.
author2 Stuart Madnick and Allen Moulton.
author_facet Stuart Madnick and Allen Moulton.
Khan, Shaharyar,S.M.Massachusetts Institute of Technology.
author_sort Khan, Shaharyar,S.M.Massachusetts Institute of Technology.
collection MIT
description Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019
first_indexed 2024-09-23T16:41:22Z
format Thesis
id mit-1721.1/122437
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T16:41:22Z
publishDate 2019
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/1224372019-10-05T03:00:48Z Using a system-theoretic approach to identify cyber- vulnerabilities and mitigations in industrial control systems Khan, Shaharyar,S.M.Massachusetts Institute of Technology. Stuart Madnick and Allen Moulton. Massachusetts Institute of Technology. Engineering and Management Program. System Design and Management Program. Massachusetts Institute of Technology. Engineering and Management Program System Design and Management Program Engineering and Management Program. System Design and Management Program. Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019 Cataloged from PDF version of thesis. Includes bibliographical references (pages 123-128). Recent cyber-physical attacks, such as Stuxnet, Triton etc., have invoked an ominous realization about the lethality of such attacks and the vulnerability of critical infrastructure, including power, gas and water distribution control systems. The traditional industrial practice to enhance security posture by utilizing IT security-biased protection methods narrowly focuses on improving cyber hygiene and individual component protection. Albeit essential and a good countermeasure against indiscriminate, non-targeted attacks, the reality of modern industrial control systems is that they are highly complex, interdependent and software-intensive sociotechnical systems. This makes traditional methods of defense largely impotent in the face of targeted attacks by advanced cyber-adversaries - as was demonstrated by Stuxnet. A new realization is aggressively permeating through the industry about the need to use a holistic approach that integrates safety and security considerations to rethink, reengineer and redesign these complex control systems. System-Theoretic Accident Model & Processes (STAMP) offers a powerful, holistic, structured framework to analyze safety and security of complex cyber-physical systems in an integrated fashion. The electric grid is universally acknowledged as the holy grail of a target for an advanced cyberadversary. In light of this, this work demonstrates the use of a STAMP-based analysis method on the electric generation and distribution system of the MIT central utilities plant. The analysis is presented in a robust and structured format which can be emulated to analyze larger systems. Several hazardous control actions such as out-of-sync breaker closure, generator overfluxing, turbine overspeed etc., are identified which could be exploited to cause permanent physical damage to the plant. While traditional counter-measures exist, it is argued that they need to be rethought in the face of potential cyber-attacks by advanced adversaries. Finally, several new functional requirements are presented which do not only span individual technical components but also the broader socio-organizational system. by Shaharyar Khan. S.M. in Engineering and Management S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program 2019-10-04T21:34:37Z 2019-10-04T21:34:37Z 2019 2019 Thesis https://hdl.handle.net/1721.1/122437 1120724236 eng MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. http://dspace.mit.edu/handle/1721.1/7582 129 pages application/pdf Massachusetts Institute of Technology
spellingShingle Engineering and Management Program.
System Design and Management Program.
Khan, Shaharyar,S.M.Massachusetts Institute of Technology.
Using a system-theoretic approach to identify cyber- vulnerabilities and mitigations in industrial control systems
title Using a system-theoretic approach to identify cyber- vulnerabilities and mitigations in industrial control systems
title_full Using a system-theoretic approach to identify cyber- vulnerabilities and mitigations in industrial control systems
title_fullStr Using a system-theoretic approach to identify cyber- vulnerabilities and mitigations in industrial control systems
title_full_unstemmed Using a system-theoretic approach to identify cyber- vulnerabilities and mitigations in industrial control systems
title_short Using a system-theoretic approach to identify cyber- vulnerabilities and mitigations in industrial control systems
title_sort using a system theoretic approach to identify cyber vulnerabilities and mitigations in industrial control systems
topic Engineering and Management Program.
System Design and Management Program.
url https://hdl.handle.net/1721.1/122437
work_keys_str_mv AT khanshaharyarsmmassachusettsinstituteoftechnology usingasystemtheoreticapproachtoidentifycybervulnerabilitiesandmitigationsinindustrialcontrolsystems