Design of a Novel Information System for Semi-automated Management of Cybersecurity in Industrial Control Systems

IF 2.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS ACM Transactions on Management Information Systems Pub Date : 2022-07-14 DOI:10.1145/3546580
Kimia Ameri, M. Hempel, H. Sharif, Juan Lopez, K. Perumalla
{"title":"Design of a Novel Information System for Semi-automated Management of Cybersecurity in Industrial Control Systems","authors":"Kimia Ameri, M. Hempel, H. Sharif, Juan Lopez, K. Perumalla","doi":"10.1145/3546580","DOIUrl":null,"url":null,"abstract":"There is an urgent need in many critical infrastructure sectors, including the energy sector, for attaining detailed insights into cybersecurity features and compliance with cybersecurity requirements related to their Operational Technology (OT) deployments. Frequent feature changes of OT devices interfere with this need, posing a great risk to customers. One effective way to address this challenge is via a semi-automated cyber-physical security assurance approach, which enables verification and validation of the OT device cybersecurity claims against actual capabilities, both pre- and post-deployment. To realize this approach, this article presents new methodology and algorithms to automatically identify cybersecurity-related claims expressed in natural language form in ICS device documents. We developed an identification process that employs natural language processing (NLP) techniques with the goal of semi-automated vetting of detected claims against their device implementation. We also present our novel NLP components for verifying feature claims against relevant cybersecurity requirements. The verification pipeline includes components such as automated vendor identification, device document curation, feature claim identification utilizing sentiment analysis for conflict resolution, and reporting of features that are claimed to be supported or indicated as unsupported. Our novel matching engine represents the first automated information system available in the cybersecurity domain that directly aids the generation of ICS compliance reports.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":"14 1","pages":"1 - 35"},"PeriodicalIF":2.5000,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Transactions on Management Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3546580","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 2

Abstract

There is an urgent need in many critical infrastructure sectors, including the energy sector, for attaining detailed insights into cybersecurity features and compliance with cybersecurity requirements related to their Operational Technology (OT) deployments. Frequent feature changes of OT devices interfere with this need, posing a great risk to customers. One effective way to address this challenge is via a semi-automated cyber-physical security assurance approach, which enables verification and validation of the OT device cybersecurity claims against actual capabilities, both pre- and post-deployment. To realize this approach, this article presents new methodology and algorithms to automatically identify cybersecurity-related claims expressed in natural language form in ICS device documents. We developed an identification process that employs natural language processing (NLP) techniques with the goal of semi-automated vetting of detected claims against their device implementation. We also present our novel NLP components for verifying feature claims against relevant cybersecurity requirements. The verification pipeline includes components such as automated vendor identification, device document curation, feature claim identification utilizing sentiment analysis for conflict resolution, and reporting of features that are claimed to be supported or indicated as unsupported. Our novel matching engine represents the first automated information system available in the cybersecurity domain that directly aids the generation of ICS compliance reports.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种新型工业控制系统网络安全半自动化管理信息系统的设计
包括能源部门在内的许多关键基础设施部门迫切需要深入了解网络安全特征,并遵守与运营技术部署相关的网络安全要求。OT设备频繁的功能变化干扰了这种需求,给客户带来了巨大的风险。解决这一挑战的一种有效方法是通过半自动化的网络物理安全保证方法,该方法能够根据部署前和部署后的实际能力验证OT设备的网络安全声明。为了实现这种方法,本文提出了新的方法和算法来自动识别ICS设备文档中以自然语言形式表达的网络安全相关声明。我们开发了一个使用自然语言处理(NLP)技术的识别过程,目的是根据设备实现对检测到的索赔进行半自动审查。我们还介绍了我们的新型NLP组件,用于根据相关网络安全要求验证功能声明。验证管道包括自动供应商识别、设备文档管理、利用情绪分析进行冲突解决的功能声明识别,以及报告声称支持或表示不支持的功能等组件。我们的新型匹配引擎代表了网络安全领域中第一个可直接帮助生成ICS合规报告的自动化信息系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
ACM Transactions on Management Information Systems
ACM Transactions on Management Information Systems COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
6.30
自引率
20.00%
发文量
60
期刊最新文献
From Dissonance to Dialogue: A Token-Based Approach to Bridge the Gap Between Manufacturers and Customers A Process Mining Method for Inter-organizational Business Process Integration Introduction to the Special Issue on IT-enabled Business Management and Decision Making in the (Post) Covid-19 Era Non-Monotonic Generation of Knowledge Paths for Context Understanding How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk Exposure in their Industrial IoT Network?
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1