Abstract
SCADA is one of a set of manufacturing-and-control systems that are used to monitor and control critical infrastructure. Such systems extensively utilise communications network protocols such as TCP/IP to interconnect a diverse array of components. A major forthcoming change within TCP/IP is the adoption of the IPv6 protocol and inevitably this change will affect SCADA systems. However IPv6 introduces its own set of vulnerabilities. Hence, given the scale and complexity of current SCADA systems, there is a need for organisations to be able to model and review the risks emanating from the propagation of identifiable vulnerabilities in IPv6 prior to actual operational deployment. This work shows how the required tools can be constructed by complementing the Information Security Management (ISM) risk modelling tool with the formal technique of Coloured Petri Nets (CPN). The results of the application of the tools in a case study confirm the utility of the approach.
Chapter PDF
Similar content being viewed by others
References
Wiles, J., Drake, P., Claypoole, T.: Techno Security’s Guide to Securing SCADA: A Comprehensive Handbook on Protecting The Critical Infrastructure. Syngress, Rockland, Mass. (2007)
United States Government Accountability Office, Internet Protocol Version 6: Federal Agencies Need to Plan for Transition and Manage Security Risks (2005)
United States Department of Commerce, The Evolving Internet: A Technical and Economic Assessment of Internet Protocol, Version 6, IPv6 (2006)
Jensen, K.: A Brief Introduction to Coloured Petri Nets. In: Brinksma, E. (ed.) TACAS 1997. LNCS, vol. 1217, pp. 203–208. Springer, Heidelberg (1997)
Branagan, M., Dawson, R., Longley, D.: User Documentation - ISM (Information Security Management) Risk Management Tool (2006)
Leeuwen, B.V.: Impacts of IPv6 on Infrastructure Control Systems. Sandia Report SAND2007-0383P. Sandia National Laboratories (2007), http://www.sandia.gov/scada/documents/VanLeeuwen-2007-0383P.pdf
Narten, T., Nordmark, E., Simpson, W.: Neighbor: Discovery for IPVersion 6 (IPv6), RFC 2461. The Internet Society (1998), http://www.ietf.org/rfc/rfc2461.txt
Nikander, P., Kempf, J., Nordmark, E.: IPv6 Neighbor Discovery (ND) Trust Models and Threats, RFC 3756. The Internet Society (2004), http://www.ietf.org/rfc/rfc2461.txt
Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC 3775. The Internet Society (2004), http://www.ietf.org/rfc/rfc3775.txt
Davies, E., Krishnan, S., Savola, P.: IPv6 Transition/Co-existence Security Considerations, RFC 4942. The Internet Society (2007), http://www.ietf.org/rfc/rfc4942.txt
Savola, P., Patel, C.: Security Considerations for 6to4, RFC 3964, Informational (2004)
Convery, S., Miller, D.: IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation. Cisco Systems White Paper (2004)
Dawson, R.E.: Secure communications for critical infrastructure control systems. Queensland University of Technology, Brisbane, QLD (2008)
Stouffer, K., Falco, J., Kent, K.: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. In: Recommendations of the National Institute of Standards and Technology (2006)
Branagan, M., Dawson, R., Longley, D.: Security Risk Analysis for Complex Systems. In: Proceedings of the Information Security for South Africa 2006 from Insight to Foresight Conference, ISSA, Pretoria, South Africa (2006)
Caelli, W.J., Longley, D., Tickle, A.B.: A Methodology for Describing Information and Physical Security Architectures. In: Eight International Conference on Information Security (SEC) 1992. IFIP Transactions, Singapore (1992)
Kwok, L.F., Longley, D.: Information security management and modeling. Information Management and Computer Security 7(1), 30–39 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP
About this paper
Cite this paper
Suriadi, S., Tickle, A., Ahmed, E., Smith, J., Morarji, H. (2010). Risk Modelling the Transition of SCADA System to IPv6. In: Berleur, J., Hercheui, M.D., Hilty, L.M. (eds) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience. HCC CIP 2010 2010. IFIP Advances in Information and Communication Technology, vol 328. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15479-9_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-15479-9_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15478-2
Online ISBN: 978-3-642-15479-9
eBook Packages: Computer ScienceComputer Science (R0)