Top Banner
Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis
15

Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

Dec 18, 2015

Download

Documents

Joanna West
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

Vulnerability of Complex System

Lokaltermin des ETH-PräsidentenMittwoch, 1. Juli 2009

Laboratory for Safety Analysis

Page 2: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

2ETH Zürich Laboratory for Safety Analysis

Problems:

• Numerous variables, highly integrated• Structure stable over time, low dynamics• Analytical thinking and diligence sufficient

Methods:

• Decomposition of systems, causal chains; PSA framework• Further developments required, e.g. human factors, common cause failures

Major challenge : From reliability and risk engineering of complicated systems ...

Page 3: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

3ETH Zürich Laboratory for Safety Analysis

Complex systems:

• Inadequate information about elements, states and interactions• Nonlinearities, feedback loops, adaptive emergent behavior

Problems:

• System behavior unequal sum of single elements’ behavior• Strong interdependencies • Need to model and simulate „system-of-

systems“

... to vulnerability assessment of complex systems

Page 4: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

4ETH Zürich Laboratory for Safety Analysis

What if…

Drinking water is missing due to

Electrical energy system break down due to

Missing communication service due to

Overloaded communication component due to

Cyber attack due to

Critical Infrastructure Protection (CIP)

Page 5: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

5ETH Zürich Laboratory for Safety Analysis

Critical Infrastructures Interdependencies: Scientific Support for Federal Office for Civil Protection

Source: IRGC White Paper 3, 2006

(red: high, green: low, yellow: medium)

Fig. Assessment matrix for five coupled infrastructures current started

Page 6: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

6ETH Zürich Laboratory for Safety Analysis

Electric Power Systems: Italian Blackout 2003

Page 7: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

7ETH Zürich Laboratory for Safety Analysis

• Internet protocols were designed for an environment of trustworthy academic and government users with limited applications, not for global users.

• Commercial off-the-shelf (COTS) software (the number of features and rapid time to market outweigh a thoughtful security design)

• Monocultures of, individual and networked computers, applications, routers, switches and operating systems increase the effects of any threat: – a single vulnerability can exist and be exploited in millions of identical copies

of the same software and hardware

Internet (infrastructure) security

Page 8: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

8ETH Zürich Laboratory for Safety Analysis

SCADA (real Swiss case) – search of potential hacker entry points

SCADA-systemControl center

SCADA-systemSubstation

Substation LAN

Fiber cablepower line

(separated from other users)

Remote Terminal Unit

(RTU)

Sensor Actuator

SCADA Database

(3)(1) Dedicated data exchange between utilities

and Swiss TSO (PIA system)

(2) Trading/office systems separated from SCADA

(1) Own control systems – can be operated via own telephone lines; protective systems/devices independent from SCADA

(1)

(2)

Page 9: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

9ETH Zürich Laboratory for Safety Analysis

Drinking Water

© SVGW / SSIGE / SSIGA 2003; www.trinkwasser.ch

Page 10: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

10ETH Zürich Laboratory for Safety Analysis

Water: Simulation of contamination

• Scenarios• Contaminations

• Flow• Concentration

• Sensor placement

Page 11: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

11ETH Zürich Laboratory for Safety Analysis

Methods: framework for vulnerability analysis

Page 12: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

12ETH Zürich Laboratory for Safety Analysis

Intact

Repairing

Defect

MemoryGoal

Method: Agent Based Modeling (ABM)

Has different states (Finite State Machine, FSM)

Is capable of interaction with its environment (e.g. other objects)

has „receptors“ and „effectors“ for specific („messages“) and non-specific (environmental variables) signals

Can act randomly

May have a memory (learning)

Can strive for a goal

Page 13: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

13ETH Zürich Laboratory for Safety Analysis

Simulation of N objects

• One single object does not tell us much about the behaviour of its macro-system

• Therefore every component of a system has to be modelled separately by an object

• By the computational simulation of all objects, the global system behaviour and the system states emerge

Intact

Repairing

Defect

Page 14: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

14ETH Zürich Laboratory for Safety Analysis

Agent-based Modelling applied to the electric power system

3. Die Simulation

Cumulative blackout probability: L = 0.45

0.00001

0.0001

0.001

0.01

0.1

0.001 0.01 0.1 1load shed / demand

p

Cumulative blackout probability: L = 0.4

0.00001

0.0001

0.001

0.01

0.1

0.001 0.01 0.1 1load shed / demand

p

Cumulative blackout probability: L = 0.35

0.00001

0.0001

0.001

0.01

0.1

0.001 0.01 0.1 1load shed / demand

p

Kumulative Ausfallswahrscheinlichkeit

2. Die Systemmodellierung

Operateur

Leitung VerbraucherKraftwerk

Modell

Reale Welt

Multi-Agenten-System (Umgebung)

Agent 1:Kraftwerk

Agent 3:Operateur

Agent 2:Verbraucher

Agent 4:Leitung

Operateur

Leitung VerbraucherKraftwerk

Modell

Reale Welt

Multi-Agenten-System (Umgebung)

Agent 1:Kraftwerk

Agent 3:Operateur

Agent 2:Verbraucher

Agent 4:Leitung

1. Das Konzept

HandlungWahrnehmung

Agent• Attribute• Verhaltensregeln• Gedächtnis•…

Umgebung

HandlungWahrnehmung

Agent• Attribute• Verhaltensregeln• Gedächtnis•…

Umgebung

1. Identify the components of the system. Determine the states of each component by making use of FSM.

2. Establish the communication among the objects.

3. Simulate your model to generate the system states and estimate Blackout Frequencies

Page 15: Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.

15ETH Zürich Laboratory for Safety Analysis

Conclusions

• Complex systems (e.g. CIs) face multiple threats (technical-human, natural, physical, cyber, contextual; unintended or malicious); may pose risks themselves

• CIs show high complexity, inter-dependencies of different type, coupling and interaction level, e.g. through a host of industrial ICT

• Vulnerability analysis of complex systems calls for ‘system-of-systems thinking’, suitable techniques and problem-oriented approach.

• LSA has developted a comprehensive framework for vulnerability analysis of complex systems