z-logo
open-access-imgOpen Access
Exploring Ontologies for Mitigation Selection of Industrial Control System Vulnerabilities
Author(s) -
Thomas Heverin,
Michael Cordano,
Andy Zeyher,
Matthew Lashner,
Sanjana Suresh
Publication year - 2022
Publication title -
proceedings of the ... international conference on information warfare and security/the proceedings of the ... international conference on information warfare and security
Language(s) - English
Resource type - Journals
eISSN - 2048-9889
pISSN - 2048-9870
DOI - 10.34190/iccws.17.1.32
Subject(s) - computer science , nist , vulnerability (computing) , exploit , secure coding , computer security , industrial control system , software , task (project management) , domain (mathematical analysis) , control (management) , software engineering , information security , software security assurance , systems engineering , engineering , artificial intelligence , natural language processing , security service , programming language , mathematical analysis , mathematics
Mitigating vulnerabilities in industrial control systems (ICSs) represents a highly complex task. ICSs may contain an abundance of device types, all with unique software and hardware components. Upon discovering vulnerabilities on ICS devices, cyber defenders must determine which mitigations to implement, and which mitigations can apply across multiple vulnerabilities. Cyber defenders need techniques to optimize mitigation selection. This exploratory research paper shows how ontologies, also known as linked-data models, can potentially be used to model ICS devices, vulnerabilities, and mitigations, as well as to identify mitigations that can remediate or mitigate multiple vulnerabilities. Ontologies can be used to reduce the complexity of a cyber defender’s role by allowing for insights to be drawn, especially in the ICS domain. Data are modelled from the Common Platform Enumeration (CPE), the National Vulnerability Database (NVD), standardized list of controls from the National Institute of Standards and Technology (NIST), and ICS Cyber Emergency Response Team (CERT) advisories. Semantic queries provide the techniques for mitigation prioritization. A case study is described for a selected programmable logic controller (PLC), its known vulnerabilities from the NVD, and recommended mitigations from ICS CERT. Overall, this research shows how ontologies can be used to link together existing data sources, to run queries over the linked data, and to allow for new insights to be drawn for mitigation selection. 

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here