The National Academies Logo
Research Associateship Programs
Fellowships Office
Policy and Global Affairs

Participating Agencies - ARL

  Sign InPrintable View

Opportunity at U.S. Army Research Laboratory (ARL)

Security Models for SCADA and other Industrial Control Systems

Location

MD and NM-Computational and Information Sciences, Computational and Information Sciences Directorate

RO# Location
76.36.02.B8399 Adelphi, MD 207831197

Advisers

Name E-mail Phone
Colbert, Edward J edward.j.colbert2.civ@mail.mil 301.394.1674

Description

Industrial Control Systems (ICSs) are a general class of cyber-physical control systems that include SCADA (Supervisory Control and Data Acquisition) systems, building control systems, electronic home monitoring systems, industrial production line equipment, the national electrical grid, and many more automated electronic systems that control crucial infrastructure and services. In general, ICSs were designed to be used in isolation from computer networks. However, modern ICSs often have cyber-network components and their systems are often connected to external networks with little or no cyber-security precautions. This exposes the underlying physical systems to highly capable attackers. A transition in design and operation of ICSs must occur in order for these interconnected systems to be safe. Since the processes being controlled are often controlling critical elements, it is very important to design reliable methods for monitoring and designing these systems, especially since the volume of control systems continues to grow in the ever-expanding Internet-of-Things.

The goal of this research opportunity is to develop practical security models of ICSs that can be used to measure relevant internal security properties of the systems. Some example metrics are reliability of the system process, vulnerability of the cyber-physical system to attack, robustness of the control system, and resilience of the process availability to attacks. Sample methods of security modeling include game theory, petri nets, risk estimate models, and attack graphs.

 

References

Zhu Q, Basar T: Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems. IEEE Control System Magazine 35(1): 46, 2015

Carcano A, et al: A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems. IEEE Transactions on Industrial Informatics 7(2): 179-186, 2011

Liao HJ, et al: Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications 36(1): 16-24, 2013

 

Keywords:
SCADA; ICS; CPS; Security; Models; Risk; Vulnerability; Metrics; Control system;

Eligibility

Citizenship:  Open to U.S. citizens, permanent residents and non-U.S. citizens
Level:  Open to Postdoctoral applicants
Copyright © 2014. National Academy of Sciences. All rights reserved. 500 Fifth St. N.W., Washington, D.C. 20001.
Terms of Use and Privacy Statement.