SlideShare a Scribd company logo
Critical Infrastructures Governance
Exploring SCADA Cybernetics through Architectured Policy Semantic
Djamel Khadraoui and Christophe Feltus
Service Science and Innovation, Public Research Centre Henri Tudor
29, avenue John F. Kennedy
L-1855 Luxembourg-Kirchberg, Luxembourg
christophe.feltus@tudor.lu
Abstract — SCADA-systems are very complex, sophisticated and
integrated systems which support people in monitoring and
governing the huge volumes of knowledge engendered by critical
infrastructures (industry, energy, transport, and healthcare).
These systems are elaborated upon a colossal range of
precontrived components which need to interact thoroughly with
each other although, a priori, they all use heterogeneous
technologies and protocols, they behave unevenly through the
SCADA architecture, and they are all located in miscellaneous
corners of the production system. Furthermore, these
components interact, amongst other, by means of policies which
formulate the reasoning for component behaviour in terms of
expecting actions realization or in terms of accessed information.
This paper explores these policies’ semantic through a unified
component modelling approach with the aim of providing a
homogeneous and coherent framework, adapted for the
governance of the system by all SCADA and non-SCADA
operators.
Keywords — Policy management; SCADA system; architecture;
IS security; critical infrastructure.
I. INTRODUCTION
SCADA 1
systems are very complex, sophisticated and
integrated systems which support people in monitoring and
governing the huge volumes of knowledge engendered by
critical infrastructures (CI – in industry, energy, transport, and
healthcare) [1]. In our previous work, we have defined a
metamodel for the components of the SCADA architecture
[2]. This metamodel has been elaborated acknowledging
traditional enterprise architecture metamodel (EAM) and it
allows modelling each component according to a similar
structure. This structure proposes a representation of the latter
based on a three layered perspective, namely: the organization
layer, the application layer and the technical layer [4, 5].
Contrary to traditional EAM, one particular aspect of the
metamodel elaborated for SCADA’s components is that it is
enriched with the concept of policy at the two upper
architecture layers, thereby making it possible to elicit
organizational policies and application policies [2].
Depicting SCADA systems allows acknowledging the wide
range of components which compose it [6], like for instance:
the remote terminal unit (RTU), the intrusion detection system
(IDS), the monitoring tools, the honeypots, and so forth. These
components need to interact with each other and therefore, it is
fundamental to have the system supported by accurate and
1
Supervisory Control and Data Acquisition
perfectly integrated policies. Indeed, when for instance, a
monitoring system detects an intrusion, it requests the firewall
to adapt the filtering policy to face this intrusion. This
requirement for adaptation is achieved by a filtering policy
modification, induced by the monitoring tool. Another example
is the alert correlation performed by a correlation engine. The
homology is achieved according to the correlation policy which
receives alerts from different network sources and which, based
on the correlation policy, generates a new policy at the
destination of the protection mechanisms such as the access
right manager, the server, and so forth. In this context, the
amount of generated policies is very important. Their
elaboration is based on different (meta-) models [7] which have
different semantics (intrusion detection, alert correlation,
reaction, access control, etc. [8]), and that are activated at
different layers of the network (organizational, application or
technical policies).
The objective of this work is to support the SCADA
manager and human operators with an integrated approach for
designing, managing and monitoring SCADA systems policies.
To that end, we propose a solution which consists in modelling
each SCADA component based on the SCADA metamodel, to
elaborate the connections between the SCADA components’
instances, and to define the policy acknowledging the
information in input, the expected format of the outlay policy,
and the operational rules. This paper is organized as follows. In
the next section, we propose a synthetic review of the SCADA
metamodel, in Section III, we highlight how a policy may be
easier engineered following components’ instances and how a
policy monitoring solution may concretely benefit the SCADA
operators and managers. Afterwards we provide a case study
extracted from [15] and finally, we describe the main related
work and conclude the paper.
II. SCADA METAMODEL BACKGROUND
This section recalls our previous work in the field of SCADA
system modelling. We first introduce the SCADA metamodel,
followed by the SCADA modelling layers.
A. SCADA metamodelling insights
Our goal in modelling the SCADA system into a layered
architecture metamodel is to provide CI operators with the
tools for governing SCADA systems (monitoring and decision
making). In previous works [2], we have elaborated such a
SCADA metamodel based on the ArchiMate®
language to give
a multiple layered view of a SCADA component using
policies. To generate the latter, we realized a specialization of
the original ArchiMate®
metamodel for SCADA components.
Firstly, we redefined the Core of the metamodel in order to
figure out the concept of the Policy (Fig. 1.). The Core
represents the handling of Passive Structures by Active
Structures during the realization of Behaviours. For the Active
Structures and the Behaviour, the Core differentiates between
external concepts, which represent how the architecture is
being perceived by the external components (as a Service
Provider attainable by an Interface), and the internal concept
which is composed of Structure Elements (Roles,
Components) and linked to a Policy Execution concept.
Passive Structures contains Object (e.g. data and
organizational object) which represents architecture
knowledge. Secondly, the concept of Policy was defined in
accordance to the SCADA metamodel. The proposed
representation is composed of three elements defining the
Policy:
1. “Event” is defined as something done by a Structure
Element which generates the execution of a Policy.
2. “Context” symbolizes a configuration of Passive Structure
that allows the Policy to be executed (e.g. a security level
or the value of an object).
3. “Responsibility” [9, 10] is defined as a state assigned to an
agent (human or software) to specify obligations and rights
in a specific context [2]. Thereby, responsibilities
correspond to a set of behaviours that have to be performed
by Structure Elements. This behaviour can use Object from
Passive Structure or modify values.
With these three elements, we generate an auxiliary Policy
artefact mirroring the execution of a set of Responsibilities in
a specific Context and in response to a determined Event.
Concepts and colours were taken from the original
ArchiMate®
metamodel, except for Organizational Function
and the Application Function which were replaced by the
Organizational Policy concept and the Application Policy
concept. Through the Policy Concept, we show that each
operation done by the SCADA components can be transferred
into a Policy Execution. Although there is a semantic
difference in ArchiMate®
between the application and the user
who exploits the application, in the SCADA domain, we
consider that actors and roles are played by components that
we define as being specific Structure Elements acting in CI
context. Hence, three layers structure the metamodel for the
SCADA components:
4. The Organizational Layer offers products and services to
external customers, which are realized in the organization
by organizational processes performed by Organizational
Roles according to Organizational Policies.
5. The Application Layer supports the Organizational Layer
with Application Services which are realized by
Applications according to Application Policies.
6. The Technology Layer offers Infrastructure Services
needed to run applications, realized by computer and
communication hardware and system software.
Based on this analysis, we had defined the Organizational
Policy as the rules which define the organizational
responsibilities and govern the execution of behaviours, at the
organization domain, that serve the product domain in
response to a process domain occurring in a specific context,
which is symbolized by a configuration of the information
domain. And we defined the Application Policy as the rules
that define the application responsibilities and govern the
execution, at the application domain, of behaviours that serve
the data domain to achieve the application strategy.
B. SCADA metamodel layers
The three layers which structure the SCADA metamodel (Fig.
1) are the Organizational, Application and Technical Layers:
The Organizational Layer highlights the organizational
processes and their links to the Application Layer. At first the
Organizational Layer is defined by an Organizational Role
(e.g. Alert Detection Component). This role, accessible from
the outside through an Organizational Interface, performs
behaviour on the basis of the organization's policy
(Organizational Policy) associated with the role. Then, the
component is able (depending on its role) to interact with other
roles to perform behaviour; this is symbolized by the concept
of Role Collaboration [2]. Organizational Policies are
behavioural components of the organization whose goal is to
achieve an Organizational Service to a role following Events.
Organizational Services are contained in Products
accompanied by Contracts. Contracts are formal or informal
specifications of the rights and obligations associated with a
Product. Values are defined as an appreciation of a Service or
a Product that the Organization attempts to provide or acquire.
The Organizational Objects define units of information that
relate to an aspect of the organization.
The Application layer is used to represent the Application
Components and their interactions with the Application
Service derived from the Organizational Policy of the
Organizational Layer. The concept of the components in the
metamodel is very similar to the components concept of UML
[11] and allows representing any part of the program.
Components use Data Object which is a modelling concept of
objects and object types of UML. Interconnection between
components is modelled by the Application Interface in order
to represent the availability of a component to the outside [2]
(implementing a part or all of the services defined in the
Application Service). The concept of Collaboration from the
Organizational Layer is present in the Application Layer as
the Application Collaboration and can be used to symbolize
the cooperation (temporary) between components for the
realization of behaviour. Application Policy represents the
behaviour that is carried out by the components.
The Technical Layer is used to represent the structural
aspect of the system and highlights the links between the
Technical Layer and the Application Layer and how physical
pieces of information called Artefacts are produced or used.
The main concept of the Technical layer is the Node which
represents a computational resource on which Artefacts can be
deployed and executed. The Node can be accessed by other
Nodes or by components of the Application Layer. A Node is
composed of a Device and a System Software [4]. Devices are
physical computational resources where Artefacts are
deployed when the System Software represents a software
environment for types of components and objects.
Communication between the Nodes of the Technology Layer is
defined logically by the Communication Path and physically
by the Network.
The complete SCADA metamodel is the union of the three
layers. As shown below, new connections between the layers
have appeared. For the Passive Structure we observe that
Artefact of the Technical Layer realizes Data Object of the
Application Layer which, itself, realizes Organizational
Object of the Organizational layer.
Figure 1: Three layers of SCADA system metamodel extracted from [2]
The Behaviour element connections show that the
Application Service uses the Organizational Policy to
determine the services which it proposes. In the same way, the
Technical Layer bases its Infrastructure Service upon the
Application Policy of the Application Layer. Concerning the
Active Structure connections, the Role concept determines,
along with the Application Component, the Interface provided
in the Application layer. The Interface of the Technical Layer
is also based on the components of the Application Layer.
C. Policy modelling
In the Organizational Layer, Organizational Policy can
be represented as an UML Use Case [11] where concepts of
Roles represent the Actors which have Responsibilities in
the Use Case, and the Collaboration concepts show the
connections between them. Concepts of Products, Value and
Organizational Service provide the Goal of the Use Case.
Pre- and Post-conditions model the context of the Use Case
and are symbolized in the metamodel by the Event concept
(pre-condition) and the Organizational Object (pre-/post-
condition). In the Application Layer, Application Policy is
defined as the realization of Responsibilities by the
Application Domain in a configuration of the Data Domain.
UML provides support for modelling the behaviour performed
by the Application Domain as Sequence Diagram.
Configuration of the Data Domain can be expressed as Pre-
conditions of the Sequence Diagram and symbolized by the
execution of a test-method on the lifeline of the diagram.
III. POLICY ENGINEERING
To engineer the SCADA policies, two steps are necessary. The
first one concerns the modelling of each SCADA component
according to the metamodel. The second one concerns the
detection and identification of the connections amongst each
composing artefact of the component models.
A. SCADA metamodel instance per component
This first step aims at providing the SCADA operators and
managers with a holistic and integrated view of the SCADA
architecture building blocks. To that end, the SCADA
metamodel is instantiated for each architecture component.
This step is achieved by shaping the component according to
the three abstractions typically advocated by the enterprise
architecture paradigm. This step allows discovering the
building artefacts of the components as well as the
connections amongst the components artefacts. This unified
representation of each component implies paramount
outcomes for the SCADA operator since it confers to the latter
a global functional insight of each component irrespective of
any implementation or vendors’ influence.
B. Policy semantic investigation
The unitary SCADA component models are used in the second
step to picture the global structure of the SCADA architecture
and of the connections, in terms of policies, amongst the
components of the architecture. Fig. 2 highlights the two types
of policies recovered in SCADA architecture:
1) Cognitive Policy
Cognitive Policies [12] are represented in blue in Fig. 2. They
represent policies which govern the behaviour of one artefact
of the component architecture. This policy specifies the rule
that the Responsible artefact needs to follow for the execution
of a defined activity in a specific execution context. This rule
is dictated by the artefact which exists in the same component
or in another one. The artefact which generates the policy is
the Master artefact and the one which execute it is the Slave
artefact. The Cognitive Policy morphology is articulated on
the following set of attributes (perceived by [13]): Master
artefact, Slave artefact, Master component, Slave component,
Behaving rule, Trigger item, Usage context, Priority extension
(Table I).
Table I. Cognitive policy attributes’ name and attributes’ ID
Attribute Name Attribute’s ID
Master artefact CP-Ma-art
Salve artefact CP-S-art
Master component CP-Ma-Com
Slave component CP-S-Com
Behaving rule CP-Ru
Trigger item CP-TI
Usage context CP-UC
Priority extension CP-prior
The application schema of a CP, as presented in Fig. 2, obeys
the two following controls: (1) the communication path is
from a Master structural concept to a Slave behavioral concept
or (2) the communication path is from a Master behavioural
artefact to another Slave behavioural artefact.
Figure 2. Two types of policy for SCADA. CP in blue and PP in red.
1) Permissive Policy
Permissive Policies are represented in red in Fig. 2. They
represent policies which govern the knowledge acquisition
rules from the Master to the Slave artefact [14]. This
knowledge acquisition traditionally takes the form of SCADA
states data accessed or provided in order to provide the
Responsible with the access (of in, out, in_out types [16])
to successive Cognitive Policies in case of occurring events.
The Permissive Policies morphology is articulated on the
following set of attributes [perceived by [15]): Master artefact,
Slave artefact, Master component, Slave component,
Permission rules, Pre-permission conditions, Master
permission cardinality, Slave permission cardinality, and
Cognitive constraints (Table II) - sustained by Cognitive
Policy states).
Table II. Permissive Policy attributes’ name and attributes’ ID
Attribute Name Attribute ID
Master artefact PP-Ma-art
Slave artefact PP-S-art
Master component PP-Ma-Com
Slave component PP-S-Com
Permission rules PP-Ru
Permission conditions PP-Condi
Master permission cardinality PP-Ma-Car
Slave permission cardinality PP-S-Car
Cognitive constraints PP-Co.con.
The application schema of a CP, as highlighted in Figure 2,
obeys the two following controls: (1) the communication path
is from a Master structural artefact to a Slave informational
artefact or (2) the communication path is from a Master
behavioural artefact to a Slave informational artefact.
IV. USE CASE
To illustrate CP and PP in SCADA architecture and their
visualization impact on the CI governance by the SCADA
operator, we exploit the SCADA model from the [15].
Therefore, we describe the case study, we elaborate its
building blocks and we discuss the issues.
A. Description of the case study
Fig. 3 introduces the generic building blocks of a SCADA
architecture. This architecture receives input from distributed
probes (I/O from RTU and PLC) and SCADA adaptors,
provides outputs (using a View node visualization system) to
the incident team, and is refined according to new findings by
the Cyber Control Room (CCR). Our approach is illustrated by
three blocks selected according to [17]: the Detection
Correlation, the Online Cyber Analysis and the Visualization
System.
Figure 3. Building blocks of the SCADA system extracted from [15]
1) Detection correlation
Detection and cyber detection (DCD) [19] compose the
skeleton of the detection correlation mechanism which
supports the SCADA environment. Mainly three security
zones constitute the source of classified knowledge for this
DCD, namely, the corporate networks, the CI, and the field of
correlation that constitutes the input from distributed sensors.
The fields are architecture-based on traditional and specific
components from SCADA networks, to know: IDS,
Honeypots, Anti-Virus, and RTU’s mirror. DCD performs a
correlation based on low validated alerts/events aggregation
(true-positive detections [20]) to higher validated alerts. As
highlighted in Fig. 3, cyber threat and security propagation
models support the correlation mechanism by allowing
analyzing and detecting suspicious signatures and suspicious
behaviours to issue a set of Detected Cyber Parameter (DCP).
2) Online cyber analysis
The Online Cyber Analysis (OCA) module [21] acts as the
heart of the SCADA schema, since it supports the definition of
the Refined Cyber Parameters provided to the Cyber
Simulator. OCA receives as input the DCP from the DCD on
the one hand, and the data from the analysis tools on the other
hand. The Cyber-physical Events are correlated amongst this
DCD and the Operative Level Analysis module (which we
have decided not to model in this paper since it semantically
acts as the OCA at an operative level).
3) Visualization system
The Visualization System is an extensive module pictured by a
hexagon symbol and acts as an ultimate SCADA Vector of
Communication for the support of the Incident Team [22].
As depicted in Fig. 3, the input of the Visualization System is
extracted from three fundamental building blocks: the Risk
Evaluation, the Automatic Countermeasures Selection and the
Service Simulator - concatenate data from OCA (and the
Operative Level Analysis) - by means of the Cyber Simulator.
The Visualization System supports the SCADA Operators and
Incident Manager, and extensions are possible towards any
ICT Operators.
Figure 4. SCADA architecture extracted from [15] focussed on detection correlation, online cyber analysis and visualization system
B. Building blocks modelling
Fig. 4 illustrates the holistic representation of the SCADA
components realized by the two steps of the policy
engineering schema. In this figure, we focus on three blocks
advocated by [17] cyber detection/correlation, online cyber
analysis and visualization system. Four additional blocks have
been partially incorporated to support the case description:
IDS, Honeypot, Operative Level Analysis, and the CI. In this
model, we have afterwards considered the CP and PP amongst
artefacts, respectively in blue and in red. Finally, these policies
have been reformulated according to the syntax policy
attributes from Table I and II, such as motivated by [2]. The
DCD is modeled on the left size of Fig. 4 and is associated
through two PPs with the IDS and the honeypots, respectively,
by the Detection Module and the Correlation Application. The
Alert Detection DB Slave Artifact at the application layer is
determined, in turn, by the Analytical Function Policy Master
artefact (illustrated in Table III using data from [2]) from the
Online Cyber Analysis module. The OCA module is the
central part of Fig. 4 and acts as a facilitator building block
between the DCD and the Visualization System. The
Confirmed Alert data object from its application layer acts as a
Slave artifact associated with the Visualization Policy. Hence,
this latter is logically of a permissive type and is bound to the
Visualization Policy/Service master artefact. Moreover, three
CP are associated to this artefact. The two first are related to
the IDS Application and Honeypot Application (which are of
Slave type – read access allowed) and the latter is directed
towards the Visualization Policy/Service (which is of Master
type – write access allowed). Finally, the last module of Fig. 4
is the Visualization System. This latter is sustained by a Slave
type CP towards the CI Operators, and by a master type PP
towards the CI Nodes.
Table III. CP instantiation for the Analytical function policy master artifact
Attribute ID Attribute Name
CP-Ma-art Organization policy/Service (pII2)
CP-S-art Alert/Detection Database (DB a.dd)
CP-Ma-Com ONLINE CYBER ANALYSIS
CP-S-Com CYBER DETECTION AND CORRELATION
CP-Ru Policy:: pII2, DB a.dd, if Act1On=3
than DB upgrade field DB a.add
correlation list else unchange
CP-TI Probs’ flg activate (Act3On)
CP-UC Any time, sector covered plant 2.
CP-prior Probs’ priority (From Act1 to Act9)
V. RELATED WORKS
The main related work consists in a framework for assessing
the maintainability using EAM proposed by [23] which
sustains flexible systems maintenance by supporting the
SCADA operators to assess the management of the
architecture. In line with EAM, [24] provides a solution to
develop and adapt the security analysis framework for the
architectural language and [25] refines the monitoring
paradigm using EAM. [26] tackles the visualization through
real-time SCADA and very large-scale integration (VLSI)
monitoring interface, such as underlined by [27]. Cyber
security policy has been reviewed by [3] who summarizes
cyber security problems and the possible existence of
vulnerabilities. This was correlated by [17, 19 and 20] who
strengthen new policy EAM based on modelling needs as well
as on bound exploitation perspectives.
VI. CONCLUSIONS
The huge amount of information managed by CI argues for the
support of cybernetic SCADA which behaves as a very
complex and sophisticated system. This later supports human
operators in monitoring and governing the system security by
elaborating the operational policies amongst the architecture
components. This paper explores the usage of EAM to
construct an integrated SCADA metamodel dedicated to these
components’ artefacts and structured according to (1) three
layers of abstraction, namely: Organization, Application, and
Technical layer and (2) two semantically consistent types of
policies: the Permissive Policy and the Cognitive Policy. The
results of the SCADA modelling and policy engineering
approach constitute, as illustrated by the case study, a global
analytical tool for the SCADA operators which rely on a
rational and unified component security based architecture to
continuously monitor and manipulate the policy attributes
acknowledging their impact on the whole CI system.
ACKNOWLEDGMENT
The research is funded by the CockpitCI project within the 7th
framework Programme of the European Union (topic SEC-
2011.2.5-1 – Cyber-attacks against critical infrastructures).
REFERENCES
[1] Briesemeister, L., et al. Detection, correlation, and visualization of
attacks against critical infrastructure systems, 8th PST, 2010, Canada.
[2] Blangenois, J., Guemkam, G., Feltus, C., Khadraoui, D., Organizational
Security Architecture for Critical Infrastructure, 8th International
Workshop on Frontiers in Availability, Reliability and Security, ARES
2013, Regensburg, Germany
[3] Tan, S. Electric Power Automation Control System Based on SCADA
Protocols. Proceedings of the International Conference on Information
Engineering and Applications (IEA) 2012. Springer London, 2013.
[4] Lankhorst, M. ArchiMate language primer, 2004.
[5] Zachman, J. A. 2003. The Zachman Framework For Enterprise
Architecture: Primer for Enterprise Engineering and Manufacturing.
Engineering, no. July: 1-11.
[6] Li, D., Serizawa, Y., Kiuchi, M. Concept Design for a Web Based
Supervisory Control and Data-Acquisition (SCADA) System, IEEE PES
Transmission and Distribution Conference, Yokohama, 2002, pp. 32-36.
[7] Baskerville, R., Siponen, M. (2002). An information security meta-policy
for emergent organizations. Logistics of Information Management,
15(5/6) pp. 337-46.
[8] Chang, D., Patra, A., Bagepalli, N., et al. Zone-Based Firewall Policy
Model for a Virtualized Data Center. U.S. Patent No 20,130,019,277.
[9] Guemkam, G., Feltus, C., Bonhomme, C., Schmitt, P., Khadraoui, D.,
Guessoum, Z. Reputation based Dynamic Responsibility to Agent for
Critical Infrastructure, IEEE/WIC/ACM International Conference on
Intelligent Agent Technology, 22-27/8/2011, Lyon, France.
doi>10.1109/WI-IAT.2011.194
[10] Bonhomme, C., Feltus, C., Khadraoui, D. Dynamic Responsibilities
Assignment in Critical Electronic Institutions - A Context-Aware
Solution for in Crisis Access Right Management, ARES 2011, Vienna,
Austria. DOI: 10.1109/ARES.2011.43
[11] UML 2 ( http://www.uml.org/)
[12] Xu, W., Zhang, X., and Jahn, G. Towards system integrity protection
with graph-based policy analysis. In : Data and Applications Security
XXIII. Springer Berlin Heidelberg, 2009. p. 65-80.
[13] Doherty et al.. (2009). The information security policy unpacked: A
critical study of the content of university policies. IJIM 29(6)
[14] Barth, A et al. (2009). Securing frame communication in browsers.
Communications of the ACM, 52(6), pp. 83-91.
[15] Nicholson, A. et al. (2012) SCADA security in the light of Cyber-
Warfare. Computers and Security , 31 (4), pp. 418-436.
[16] Maj, S. P., Makasiranondh, W., & Veal, D. (2010). An Evaluation of
Firewall Configuration Methods. IJCSNS, 10(8), 1.
[17] Briesemeister, L., Cheung, S., Lindqvist, U., & Valdes, A. (2010,
August). Detection, correlation, and visualization of attacks against
critical infrastructure systems. In Privacy Security and Trust (PST),
2010 Eighth Annual International Conference on (pp. 15-22). IEEE.
[18] Rakocevic, V., et al. Computational intelligence in a real-time SCADA
system to monitor and control continuous casting of steel billets.
Systems, Man and Cybernetics, 1995. IEEE, Vol. 2.
[19] Daryabar, F., et al., Towards secure model for SCADA systems,
International Conference on Cyber Security, Cyber Warfare and Digital
Forensic (CyberSec), 2012 60, 64, 2012.
[20] Gill, R., Smith, J., & Clark, A. (2006, January). Experiences in passively
detecting session hijacking attacks in IEEE 802.11 networks. In
Proceedings of the 2006 Australasian workshops on Grid computing and
e-research-Volume 54 (pp. 221-230). Australian Computer Society, Inc.
[21] Fink, G. A., et al. Visualizing cyber security: Usable workspaces.
Visualization for Cyber Security, 2009. VizSec 2009. 6th International
Workshop on. IEEE, 2009.
[22] Kitamura, M., Kojima, T., & Nishida, S. (2006). SCADA Data
Visualization Using Equipment Graphs. IEEE Transactions on
Electronics, Information and Systems, p. 126, pp.788-796.
[23] Lagerström, R. Analyzing system maintainability using enterprise
architecture models. Proceedings of the 2nd Workshop on Trends in
Enterprise Architecture Research (TEAR 2007).
[24] Ekstedt, M., Sommestad, T., Enterprise architecture models for cyber
security analysis, PSCE '09. IEEE/PES, 1,6, 15-18 March 2009
[25] Stanescu, A. M. et al. Supervisory control and data acquisition for
virtual enterprise, IJPR, Vol. 40, Iss. 15, 2002.
[26] Qiu, B., et al. "Internet-based SCADA display system." Computer
Applications in Power, IEEE 15.1 (2002): pp. 14-19.
[27] Constantinescu, C. Trends and challenges in VLSI circuit reliability.
Micro, IEEE 23.4 (2003): pp. 14-19.

More Related Content

Similar to Critical infrastructures governance exploring scada cybernetics through architectured policy semantic

Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
christophefeltus
 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
Luxembourg Institute of Science and Technology
 
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_finalTowards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Smita S. Ghaisas
 
Cloud-based control systems: a systematic literature review
Cloud-based control systems: a systematic literature reviewCloud-based control systems: a systematic literature review
Cloud-based control systems: a systematic literature review
International Journal of Reconfigurable and Embedded Systems
 
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-TopicsSmart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Luxembourg Institute of Science and Technology
 
Ch7
Ch7Ch7
Report_Internships
Report_InternshipsReport_Internships
Report_Internships
Marta de la Cruz Martos
 
Auto Finding and Resolving Distributed Firewall Policy
Auto Finding and Resolving Distributed Firewall PolicyAuto Finding and Resolving Distributed Firewall Policy
Auto Finding and Resolving Distributed Firewall Policy
IOSR Journals
 
State of the Art in Cloud Security
State of the Art in Cloud SecurityState of the Art in Cloud Security
State of the Art in Cloud Security
ijsrd.com
 
81-T48
81-T4881-T48
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
IJAAS Team
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
Luxembourg Institute of Science and Technology
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial System
iosrjce
 
F017223742
F017223742F017223742
F017223742
IOSR Journals
 
Access control data security
Access control data securityAccess control data security
Access control data security
rajab ssemwogerere
 
Ch7
Ch7Ch7
Ch7
Ch7Ch7
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
christophefeltus
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
Luxembourg Institute of Science and Technology
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
ijwscjournal
 

Similar to Critical infrastructures governance exploring scada cybernetics through architectured policy semantic (20)

Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
 
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_finalTowards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
 
Cloud-based control systems: a systematic literature review
Cloud-based control systems: a systematic literature reviewCloud-based control systems: a systematic literature review
Cloud-based control systems: a systematic literature review
 
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-TopicsSmart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
 
Ch7
Ch7Ch7
Ch7
 
Report_Internships
Report_InternshipsReport_Internships
Report_Internships
 
Auto Finding and Resolving Distributed Firewall Policy
Auto Finding and Resolving Distributed Firewall PolicyAuto Finding and Resolving Distributed Firewall Policy
Auto Finding and Resolving Distributed Firewall Policy
 
State of the Art in Cloud Security
State of the Art in Cloud SecurityState of the Art in Cloud Security
State of the Art in Cloud Security
 
81-T48
81-T4881-T48
81-T48
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial System
 
F017223742
F017223742F017223742
F017223742
 
Access control data security
Access control data securityAccess control data security
Access control data security
 
Ch7
Ch7Ch7
Ch7
 
Ch7
Ch7Ch7
Ch7
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 

More from Luxembourg Institute of Science and Technology

Joint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forumJoint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forum
Luxembourg Institute of Science and Technology
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Luxembourg Institute of Science and Technology
 
Modeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languageModeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate language
Luxembourg Institute of Science and Technology
 
Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...
Luxembourg Institute of Science and Technology
 
Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...
Luxembourg Institute of Science and Technology
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
Luxembourg Institute of Science and Technology
 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...
Luxembourg Institute of Science and Technology
 
Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...
Luxembourg Institute of Science and Technology
 
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Luxembourg Institute of Science and Technology
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
Luxembourg Institute of Science and Technology
 
Service specification and service compliance how to consider the responsibil...
Service specification and service compliance  how to consider the responsibil...Service specification and service compliance  how to consider the responsibil...
Service specification and service compliance how to consider the responsibil...
Luxembourg Institute of Science and Technology
 
Responsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e governmentResponsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e government
Luxembourg Institute of Science and Technology
 
Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...
Luxembourg Institute of Science and Technology
 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...
Luxembourg Institute of Science and Technology
 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...
Luxembourg Institute of Science and Technology
 
Preliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodsPreliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methods
Luxembourg Institute of Science and Technology
 
Organizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructureOrganizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructure
Luxembourg Institute of Science and Technology
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
Luxembourg Institute of Science and Technology
 
Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...
Luxembourg Institute of Science and Technology
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
Luxembourg Institute of Science and Technology
 

More from Luxembourg Institute of Science and Technology (20)

Joint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forumJoint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forum
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
 
Modeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languageModeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate language
 
Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...
 
Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...
 
Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...Solution standard de compensation appliquée à une architecture e business séc...
Solution standard de compensation appliquée à une architecture e business séc...
 
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...
 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Service specification and service compliance how to consider the responsibil...
Service specification and service compliance  how to consider the responsibil...Service specification and service compliance  how to consider the responsibil...
Service specification and service compliance how to consider the responsibil...
 
Responsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e governmentResponsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e government
 
Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...
 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...
 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...
 
Preliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodsPreliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methods
 
Organizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructureOrganizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructure
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
 
Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 

Recently uploaded

El Nuevo Cohete Ariane de la Agencia Espacial Europea-6_Media-Kit_english.pdf
El Nuevo Cohete Ariane de la Agencia Espacial Europea-6_Media-Kit_english.pdfEl Nuevo Cohete Ariane de la Agencia Espacial Europea-6_Media-Kit_english.pdf
El Nuevo Cohete Ariane de la Agencia Espacial Europea-6_Media-Kit_english.pdf
Champs Elysee Roldan
 
CONSOLSCI8_Lesson1. presentation for NLC
CONSOLSCI8_Lesson1. presentation for NLCCONSOLSCI8_Lesson1. presentation for NLC
CONSOLSCI8_Lesson1. presentation for NLC
ROLANARIBATO3
 
Anatomy, and reproduction of Gnetum.pptx
Anatomy, and reproduction of Gnetum.pptxAnatomy, and reproduction of Gnetum.pptx
Anatomy, and reproduction of Gnetum.pptx
karthiksaran8
 
A mature quasar at cosmic dawn revealed by JWST rest-frame infrared spectroscopy
A mature quasar at cosmic dawn revealed by JWST rest-frame infrared spectroscopyA mature quasar at cosmic dawn revealed by JWST rest-frame infrared spectroscopy
A mature quasar at cosmic dawn revealed by JWST rest-frame infrared spectroscopy
Sérgio Sacani
 
Summer program introduction in Yunnan university
Summer program introduction in Yunnan universitySummer program introduction in Yunnan university
Summer program introduction in Yunnan university
Hayato Shimabukuro
 
Science grade 09 Lesson1-2 NLC-pptx.pptx
Science grade 09 Lesson1-2 NLC-pptx.pptxScience grade 09 Lesson1-2 NLC-pptx.pptx
Science grade 09 Lesson1-2 NLC-pptx.pptx
JoanaBanasen1
 
Lunar Mobility Drivers and Needs - Artemis
Lunar Mobility Drivers and Needs - ArtemisLunar Mobility Drivers and Needs - Artemis
Lunar Mobility Drivers and Needs - Artemis
Sérgio Sacani
 
SCIENTIFIC INVESTIGATIONS – THE IMPORTANCE OF FAIR TESTING.pptx
SCIENTIFIC INVESTIGATIONS – THE IMPORTANCE OF FAIR TESTING.pptxSCIENTIFIC INVESTIGATIONS – THE IMPORTANCE OF FAIR TESTING.pptx
SCIENTIFIC INVESTIGATIONS – THE IMPORTANCE OF FAIR TESTING.pptx
JoanaBanasen1
 
TOPIC: INTRODUCTION TO FORENSIC SCIENCE.pptx
TOPIC: INTRODUCTION TO FORENSIC SCIENCE.pptxTOPIC: INTRODUCTION TO FORENSIC SCIENCE.pptx
TOPIC: INTRODUCTION TO FORENSIC SCIENCE.pptx
imansiipandeyy
 
Possible Anthropogenic Contributions to the LAMP-observed Surficial Icy Regol...
Possible Anthropogenic Contributions to the LAMP-observed Surficial Icy Regol...Possible Anthropogenic Contributions to the LAMP-observed Surficial Icy Regol...
Possible Anthropogenic Contributions to the LAMP-observed Surficial Icy Regol...
Sérgio Sacani
 
Molecular biology of abiotic stress tolerence in plants
Molecular biology of abiotic stress tolerence in plantsMolecular biology of abiotic stress tolerence in plants
Molecular biology of abiotic stress tolerence in plants
rushitahakik1
 
Properties of virus(Ultrastructure and types of virus)
Properties of virus(Ultrastructure and types of virus)Properties of virus(Ultrastructure and types of virus)
Properties of virus(Ultrastructure and types of virus)
saloniswain225
 
A slightly oblate dark matter halo revealed by a retrograde precessing Galact...
A slightly oblate dark matter halo revealed by a retrograde precessing Galact...A slightly oblate dark matter halo revealed by a retrograde precessing Galact...
A slightly oblate dark matter halo revealed by a retrograde precessing Galact...
Sérgio Sacani
 
The National Research Platform Enables a Growing Diversity of Users and Appl...
The National Research Platform Enables a Growing Diversity of Users and Appl...The National Research Platform Enables a Growing Diversity of Users and Appl...
The National Research Platform Enables a Growing Diversity of Users and Appl...
Larry Smarr
 
Protein Digestion123334444556678890.pptx
Protein Digestion123334444556678890.pptxProtein Digestion123334444556678890.pptx
Protein Digestion123334444556678890.pptx
muralinath2
 
Collaborative Team Recommendation for Skilled Users: Objectives, Techniques, ...
Collaborative Team Recommendation for Skilled Users: Objectives, Techniques, ...Collaborative Team Recommendation for Skilled Users: Objectives, Techniques, ...
Collaborative Team Recommendation for Skilled Users: Objectives, Techniques, ...
Hossein Fani
 
Dalghren, Thorne and Stebbins System of Classification of Angiosperms
Dalghren, Thorne and Stebbins System of Classification of AngiospermsDalghren, Thorne and Stebbins System of Classification of Angiosperms
Dalghren, Thorne and Stebbins System of Classification of Angiosperms
Gurjant Singh
 
Search for Dark Matter Ionization on the Night Side of Jupiter with Cassini
Search for Dark Matter Ionization on the Night Side of Jupiter with CassiniSearch for Dark Matter Ionization on the Night Side of Jupiter with Cassini
Search for Dark Matter Ionization on the Night Side of Jupiter with Cassini
Sérgio Sacani
 
Transmission Spectroscopy of the Habitable Zone Exoplanet LHS 1140 b with JWS...
Transmission Spectroscopy of the Habitable Zone Exoplanet LHS 1140 b with JWS...Transmission Spectroscopy of the Habitable Zone Exoplanet LHS 1140 b with JWS...
Transmission Spectroscopy of the Habitable Zone Exoplanet LHS 1140 b with JWS...
Sérgio Sacani
 
Electrostatic force class 8 ncert. .pptx
Electrostatic force class 8 ncert. .pptxElectrostatic force class 8 ncert. .pptx
Electrostatic force class 8 ncert. .pptx
yokeswarikannan123
 

Recently uploaded (20)

El Nuevo Cohete Ariane de la Agencia Espacial Europea-6_Media-Kit_english.pdf
El Nuevo Cohete Ariane de la Agencia Espacial Europea-6_Media-Kit_english.pdfEl Nuevo Cohete Ariane de la Agencia Espacial Europea-6_Media-Kit_english.pdf
El Nuevo Cohete Ariane de la Agencia Espacial Europea-6_Media-Kit_english.pdf
 
CONSOLSCI8_Lesson1. presentation for NLC
CONSOLSCI8_Lesson1. presentation for NLCCONSOLSCI8_Lesson1. presentation for NLC
CONSOLSCI8_Lesson1. presentation for NLC
 
Anatomy, and reproduction of Gnetum.pptx
Anatomy, and reproduction of Gnetum.pptxAnatomy, and reproduction of Gnetum.pptx
Anatomy, and reproduction of Gnetum.pptx
 
A mature quasar at cosmic dawn revealed by JWST rest-frame infrared spectroscopy
A mature quasar at cosmic dawn revealed by JWST rest-frame infrared spectroscopyA mature quasar at cosmic dawn revealed by JWST rest-frame infrared spectroscopy
A mature quasar at cosmic dawn revealed by JWST rest-frame infrared spectroscopy
 
Summer program introduction in Yunnan university
Summer program introduction in Yunnan universitySummer program introduction in Yunnan university
Summer program introduction in Yunnan university
 
Science grade 09 Lesson1-2 NLC-pptx.pptx
Science grade 09 Lesson1-2 NLC-pptx.pptxScience grade 09 Lesson1-2 NLC-pptx.pptx
Science grade 09 Lesson1-2 NLC-pptx.pptx
 
Lunar Mobility Drivers and Needs - Artemis
Lunar Mobility Drivers and Needs - ArtemisLunar Mobility Drivers and Needs - Artemis
Lunar Mobility Drivers and Needs - Artemis
 
SCIENTIFIC INVESTIGATIONS – THE IMPORTANCE OF FAIR TESTING.pptx
SCIENTIFIC INVESTIGATIONS – THE IMPORTANCE OF FAIR TESTING.pptxSCIENTIFIC INVESTIGATIONS – THE IMPORTANCE OF FAIR TESTING.pptx
SCIENTIFIC INVESTIGATIONS – THE IMPORTANCE OF FAIR TESTING.pptx
 
TOPIC: INTRODUCTION TO FORENSIC SCIENCE.pptx
TOPIC: INTRODUCTION TO FORENSIC SCIENCE.pptxTOPIC: INTRODUCTION TO FORENSIC SCIENCE.pptx
TOPIC: INTRODUCTION TO FORENSIC SCIENCE.pptx
 
Possible Anthropogenic Contributions to the LAMP-observed Surficial Icy Regol...
Possible Anthropogenic Contributions to the LAMP-observed Surficial Icy Regol...Possible Anthropogenic Contributions to the LAMP-observed Surficial Icy Regol...
Possible Anthropogenic Contributions to the LAMP-observed Surficial Icy Regol...
 
Molecular biology of abiotic stress tolerence in plants
Molecular biology of abiotic stress tolerence in plantsMolecular biology of abiotic stress tolerence in plants
Molecular biology of abiotic stress tolerence in plants
 
Properties of virus(Ultrastructure and types of virus)
Properties of virus(Ultrastructure and types of virus)Properties of virus(Ultrastructure and types of virus)
Properties of virus(Ultrastructure and types of virus)
 
A slightly oblate dark matter halo revealed by a retrograde precessing Galact...
A slightly oblate dark matter halo revealed by a retrograde precessing Galact...A slightly oblate dark matter halo revealed by a retrograde precessing Galact...
A slightly oblate dark matter halo revealed by a retrograde precessing Galact...
 
The National Research Platform Enables a Growing Diversity of Users and Appl...
The National Research Platform Enables a Growing Diversity of Users and Appl...The National Research Platform Enables a Growing Diversity of Users and Appl...
The National Research Platform Enables a Growing Diversity of Users and Appl...
 
Protein Digestion123334444556678890.pptx
Protein Digestion123334444556678890.pptxProtein Digestion123334444556678890.pptx
Protein Digestion123334444556678890.pptx
 
Collaborative Team Recommendation for Skilled Users: Objectives, Techniques, ...
Collaborative Team Recommendation for Skilled Users: Objectives, Techniques, ...Collaborative Team Recommendation for Skilled Users: Objectives, Techniques, ...
Collaborative Team Recommendation for Skilled Users: Objectives, Techniques, ...
 
Dalghren, Thorne and Stebbins System of Classification of Angiosperms
Dalghren, Thorne and Stebbins System of Classification of AngiospermsDalghren, Thorne and Stebbins System of Classification of Angiosperms
Dalghren, Thorne and Stebbins System of Classification of Angiosperms
 
Search for Dark Matter Ionization on the Night Side of Jupiter with Cassini
Search for Dark Matter Ionization on the Night Side of Jupiter with CassiniSearch for Dark Matter Ionization on the Night Side of Jupiter with Cassini
Search for Dark Matter Ionization on the Night Side of Jupiter with Cassini
 
Transmission Spectroscopy of the Habitable Zone Exoplanet LHS 1140 b with JWS...
Transmission Spectroscopy of the Habitable Zone Exoplanet LHS 1140 b with JWS...Transmission Spectroscopy of the Habitable Zone Exoplanet LHS 1140 b with JWS...
Transmission Spectroscopy of the Habitable Zone Exoplanet LHS 1140 b with JWS...
 
Electrostatic force class 8 ncert. .pptx
Electrostatic force class 8 ncert. .pptxElectrostatic force class 8 ncert. .pptx
Electrostatic force class 8 ncert. .pptx
 

Critical infrastructures governance exploring scada cybernetics through architectured policy semantic

  • 1. Critical Infrastructures Governance Exploring SCADA Cybernetics through Architectured Policy Semantic Djamel Khadraoui and Christophe Feltus Service Science and Innovation, Public Research Centre Henri Tudor 29, avenue John F. Kennedy L-1855 Luxembourg-Kirchberg, Luxembourg christophe.feltus@tudor.lu Abstract — SCADA-systems are very complex, sophisticated and integrated systems which support people in monitoring and governing the huge volumes of knowledge engendered by critical infrastructures (industry, energy, transport, and healthcare). These systems are elaborated upon a colossal range of precontrived components which need to interact thoroughly with each other although, a priori, they all use heterogeneous technologies and protocols, they behave unevenly through the SCADA architecture, and they are all located in miscellaneous corners of the production system. Furthermore, these components interact, amongst other, by means of policies which formulate the reasoning for component behaviour in terms of expecting actions realization or in terms of accessed information. This paper explores these policies’ semantic through a unified component modelling approach with the aim of providing a homogeneous and coherent framework, adapted for the governance of the system by all SCADA and non-SCADA operators. Keywords — Policy management; SCADA system; architecture; IS security; critical infrastructure. I. INTRODUCTION SCADA 1 systems are very complex, sophisticated and integrated systems which support people in monitoring and governing the huge volumes of knowledge engendered by critical infrastructures (CI – in industry, energy, transport, and healthcare) [1]. In our previous work, we have defined a metamodel for the components of the SCADA architecture [2]. This metamodel has been elaborated acknowledging traditional enterprise architecture metamodel (EAM) and it allows modelling each component according to a similar structure. This structure proposes a representation of the latter based on a three layered perspective, namely: the organization layer, the application layer and the technical layer [4, 5]. Contrary to traditional EAM, one particular aspect of the metamodel elaborated for SCADA’s components is that it is enriched with the concept of policy at the two upper architecture layers, thereby making it possible to elicit organizational policies and application policies [2]. Depicting SCADA systems allows acknowledging the wide range of components which compose it [6], like for instance: the remote terminal unit (RTU), the intrusion detection system (IDS), the monitoring tools, the honeypots, and so forth. These components need to interact with each other and therefore, it is fundamental to have the system supported by accurate and 1 Supervisory Control and Data Acquisition perfectly integrated policies. Indeed, when for instance, a monitoring system detects an intrusion, it requests the firewall to adapt the filtering policy to face this intrusion. This requirement for adaptation is achieved by a filtering policy modification, induced by the monitoring tool. Another example is the alert correlation performed by a correlation engine. The homology is achieved according to the correlation policy which receives alerts from different network sources and which, based on the correlation policy, generates a new policy at the destination of the protection mechanisms such as the access right manager, the server, and so forth. In this context, the amount of generated policies is very important. Their elaboration is based on different (meta-) models [7] which have different semantics (intrusion detection, alert correlation, reaction, access control, etc. [8]), and that are activated at different layers of the network (organizational, application or technical policies). The objective of this work is to support the SCADA manager and human operators with an integrated approach for designing, managing and monitoring SCADA systems policies. To that end, we propose a solution which consists in modelling each SCADA component based on the SCADA metamodel, to elaborate the connections between the SCADA components’ instances, and to define the policy acknowledging the information in input, the expected format of the outlay policy, and the operational rules. This paper is organized as follows. In the next section, we propose a synthetic review of the SCADA metamodel, in Section III, we highlight how a policy may be easier engineered following components’ instances and how a policy monitoring solution may concretely benefit the SCADA operators and managers. Afterwards we provide a case study extracted from [15] and finally, we describe the main related work and conclude the paper. II. SCADA METAMODEL BACKGROUND This section recalls our previous work in the field of SCADA system modelling. We first introduce the SCADA metamodel, followed by the SCADA modelling layers. A. SCADA metamodelling insights Our goal in modelling the SCADA system into a layered architecture metamodel is to provide CI operators with the tools for governing SCADA systems (monitoring and decision making). In previous works [2], we have elaborated such a SCADA metamodel based on the ArchiMate® language to give a multiple layered view of a SCADA component using policies. To generate the latter, we realized a specialization of the original ArchiMate® metamodel for SCADA components.
  • 2. Firstly, we redefined the Core of the metamodel in order to figure out the concept of the Policy (Fig. 1.). The Core represents the handling of Passive Structures by Active Structures during the realization of Behaviours. For the Active Structures and the Behaviour, the Core differentiates between external concepts, which represent how the architecture is being perceived by the external components (as a Service Provider attainable by an Interface), and the internal concept which is composed of Structure Elements (Roles, Components) and linked to a Policy Execution concept. Passive Structures contains Object (e.g. data and organizational object) which represents architecture knowledge. Secondly, the concept of Policy was defined in accordance to the SCADA metamodel. The proposed representation is composed of three elements defining the Policy: 1. “Event” is defined as something done by a Structure Element which generates the execution of a Policy. 2. “Context” symbolizes a configuration of Passive Structure that allows the Policy to be executed (e.g. a security level or the value of an object). 3. “Responsibility” [9, 10] is defined as a state assigned to an agent (human or software) to specify obligations and rights in a specific context [2]. Thereby, responsibilities correspond to a set of behaviours that have to be performed by Structure Elements. This behaviour can use Object from Passive Structure or modify values. With these three elements, we generate an auxiliary Policy artefact mirroring the execution of a set of Responsibilities in a specific Context and in response to a determined Event. Concepts and colours were taken from the original ArchiMate® metamodel, except for Organizational Function and the Application Function which were replaced by the Organizational Policy concept and the Application Policy concept. Through the Policy Concept, we show that each operation done by the SCADA components can be transferred into a Policy Execution. Although there is a semantic difference in ArchiMate® between the application and the user who exploits the application, in the SCADA domain, we consider that actors and roles are played by components that we define as being specific Structure Elements acting in CI context. Hence, three layers structure the metamodel for the SCADA components: 4. The Organizational Layer offers products and services to external customers, which are realized in the organization by organizational processes performed by Organizational Roles according to Organizational Policies. 5. The Application Layer supports the Organizational Layer with Application Services which are realized by Applications according to Application Policies. 6. The Technology Layer offers Infrastructure Services needed to run applications, realized by computer and communication hardware and system software. Based on this analysis, we had defined the Organizational Policy as the rules which define the organizational responsibilities and govern the execution of behaviours, at the organization domain, that serve the product domain in response to a process domain occurring in a specific context, which is symbolized by a configuration of the information domain. And we defined the Application Policy as the rules that define the application responsibilities and govern the execution, at the application domain, of behaviours that serve the data domain to achieve the application strategy. B. SCADA metamodel layers The three layers which structure the SCADA metamodel (Fig. 1) are the Organizational, Application and Technical Layers: The Organizational Layer highlights the organizational processes and their links to the Application Layer. At first the Organizational Layer is defined by an Organizational Role (e.g. Alert Detection Component). This role, accessible from the outside through an Organizational Interface, performs behaviour on the basis of the organization's policy (Organizational Policy) associated with the role. Then, the component is able (depending on its role) to interact with other roles to perform behaviour; this is symbolized by the concept of Role Collaboration [2]. Organizational Policies are behavioural components of the organization whose goal is to achieve an Organizational Service to a role following Events. Organizational Services are contained in Products accompanied by Contracts. Contracts are formal or informal specifications of the rights and obligations associated with a Product. Values are defined as an appreciation of a Service or a Product that the Organization attempts to provide or acquire. The Organizational Objects define units of information that relate to an aspect of the organization. The Application layer is used to represent the Application Components and their interactions with the Application Service derived from the Organizational Policy of the Organizational Layer. The concept of the components in the metamodel is very similar to the components concept of UML [11] and allows representing any part of the program. Components use Data Object which is a modelling concept of objects and object types of UML. Interconnection between components is modelled by the Application Interface in order to represent the availability of a component to the outside [2] (implementing a part or all of the services defined in the Application Service). The concept of Collaboration from the Organizational Layer is present in the Application Layer as the Application Collaboration and can be used to symbolize the cooperation (temporary) between components for the realization of behaviour. Application Policy represents the behaviour that is carried out by the components. The Technical Layer is used to represent the structural aspect of the system and highlights the links between the Technical Layer and the Application Layer and how physical pieces of information called Artefacts are produced or used. The main concept of the Technical layer is the Node which represents a computational resource on which Artefacts can be deployed and executed. The Node can be accessed by other Nodes or by components of the Application Layer. A Node is composed of a Device and a System Software [4]. Devices are physical computational resources where Artefacts are deployed when the System Software represents a software environment for types of components and objects.
  • 3. Communication between the Nodes of the Technology Layer is defined logically by the Communication Path and physically by the Network. The complete SCADA metamodel is the union of the three layers. As shown below, new connections between the layers have appeared. For the Passive Structure we observe that Artefact of the Technical Layer realizes Data Object of the Application Layer which, itself, realizes Organizational Object of the Organizational layer. Figure 1: Three layers of SCADA system metamodel extracted from [2] The Behaviour element connections show that the Application Service uses the Organizational Policy to determine the services which it proposes. In the same way, the Technical Layer bases its Infrastructure Service upon the Application Policy of the Application Layer. Concerning the Active Structure connections, the Role concept determines, along with the Application Component, the Interface provided in the Application layer. The Interface of the Technical Layer is also based on the components of the Application Layer. C. Policy modelling In the Organizational Layer, Organizational Policy can be represented as an UML Use Case [11] where concepts of Roles represent the Actors which have Responsibilities in the Use Case, and the Collaboration concepts show the connections between them. Concepts of Products, Value and Organizational Service provide the Goal of the Use Case. Pre- and Post-conditions model the context of the Use Case and are symbolized in the metamodel by the Event concept (pre-condition) and the Organizational Object (pre-/post- condition). In the Application Layer, Application Policy is defined as the realization of Responsibilities by the Application Domain in a configuration of the Data Domain. UML provides support for modelling the behaviour performed by the Application Domain as Sequence Diagram. Configuration of the Data Domain can be expressed as Pre- conditions of the Sequence Diagram and symbolized by the execution of a test-method on the lifeline of the diagram. III. POLICY ENGINEERING To engineer the SCADA policies, two steps are necessary. The first one concerns the modelling of each SCADA component according to the metamodel. The second one concerns the detection and identification of the connections amongst each composing artefact of the component models. A. SCADA metamodel instance per component This first step aims at providing the SCADA operators and managers with a holistic and integrated view of the SCADA architecture building blocks. To that end, the SCADA metamodel is instantiated for each architecture component. This step is achieved by shaping the component according to the three abstractions typically advocated by the enterprise architecture paradigm. This step allows discovering the building artefacts of the components as well as the connections amongst the components artefacts. This unified representation of each component implies paramount outcomes for the SCADA operator since it confers to the latter a global functional insight of each component irrespective of any implementation or vendors’ influence. B. Policy semantic investigation The unitary SCADA component models are used in the second step to picture the global structure of the SCADA architecture and of the connections, in terms of policies, amongst the components of the architecture. Fig. 2 highlights the two types of policies recovered in SCADA architecture: 1) Cognitive Policy Cognitive Policies [12] are represented in blue in Fig. 2. They represent policies which govern the behaviour of one artefact of the component architecture. This policy specifies the rule that the Responsible artefact needs to follow for the execution of a defined activity in a specific execution context. This rule is dictated by the artefact which exists in the same component or in another one. The artefact which generates the policy is the Master artefact and the one which execute it is the Slave artefact. The Cognitive Policy morphology is articulated on the following set of attributes (perceived by [13]): Master artefact, Slave artefact, Master component, Slave component, Behaving rule, Trigger item, Usage context, Priority extension (Table I). Table I. Cognitive policy attributes’ name and attributes’ ID Attribute Name Attribute’s ID Master artefact CP-Ma-art Salve artefact CP-S-art Master component CP-Ma-Com Slave component CP-S-Com Behaving rule CP-Ru Trigger item CP-TI Usage context CP-UC Priority extension CP-prior
  • 4. The application schema of a CP, as presented in Fig. 2, obeys the two following controls: (1) the communication path is from a Master structural concept to a Slave behavioral concept or (2) the communication path is from a Master behavioural artefact to another Slave behavioural artefact. Figure 2. Two types of policy for SCADA. CP in blue and PP in red. 1) Permissive Policy Permissive Policies are represented in red in Fig. 2. They represent policies which govern the knowledge acquisition rules from the Master to the Slave artefact [14]. This knowledge acquisition traditionally takes the form of SCADA states data accessed or provided in order to provide the Responsible with the access (of in, out, in_out types [16]) to successive Cognitive Policies in case of occurring events. The Permissive Policies morphology is articulated on the following set of attributes [perceived by [15]): Master artefact, Slave artefact, Master component, Slave component, Permission rules, Pre-permission conditions, Master permission cardinality, Slave permission cardinality, and Cognitive constraints (Table II) - sustained by Cognitive Policy states). Table II. Permissive Policy attributes’ name and attributes’ ID Attribute Name Attribute ID Master artefact PP-Ma-art Slave artefact PP-S-art Master component PP-Ma-Com Slave component PP-S-Com Permission rules PP-Ru Permission conditions PP-Condi Master permission cardinality PP-Ma-Car Slave permission cardinality PP-S-Car Cognitive constraints PP-Co.con. The application schema of a CP, as highlighted in Figure 2, obeys the two following controls: (1) the communication path is from a Master structural artefact to a Slave informational artefact or (2) the communication path is from a Master behavioural artefact to a Slave informational artefact. IV. USE CASE To illustrate CP and PP in SCADA architecture and their visualization impact on the CI governance by the SCADA operator, we exploit the SCADA model from the [15]. Therefore, we describe the case study, we elaborate its building blocks and we discuss the issues. A. Description of the case study Fig. 3 introduces the generic building blocks of a SCADA architecture. This architecture receives input from distributed probes (I/O from RTU and PLC) and SCADA adaptors, provides outputs (using a View node visualization system) to the incident team, and is refined according to new findings by the Cyber Control Room (CCR). Our approach is illustrated by three blocks selected according to [17]: the Detection Correlation, the Online Cyber Analysis and the Visualization System. Figure 3. Building blocks of the SCADA system extracted from [15] 1) Detection correlation Detection and cyber detection (DCD) [19] compose the skeleton of the detection correlation mechanism which supports the SCADA environment. Mainly three security zones constitute the source of classified knowledge for this DCD, namely, the corporate networks, the CI, and the field of correlation that constitutes the input from distributed sensors. The fields are architecture-based on traditional and specific components from SCADA networks, to know: IDS, Honeypots, Anti-Virus, and RTU’s mirror. DCD performs a correlation based on low validated alerts/events aggregation (true-positive detections [20]) to higher validated alerts. As highlighted in Fig. 3, cyber threat and security propagation models support the correlation mechanism by allowing analyzing and detecting suspicious signatures and suspicious behaviours to issue a set of Detected Cyber Parameter (DCP). 2) Online cyber analysis The Online Cyber Analysis (OCA) module [21] acts as the heart of the SCADA schema, since it supports the definition of the Refined Cyber Parameters provided to the Cyber Simulator. OCA receives as input the DCP from the DCD on the one hand, and the data from the analysis tools on the other hand. The Cyber-physical Events are correlated amongst this DCD and the Operative Level Analysis module (which we
  • 5. have decided not to model in this paper since it semantically acts as the OCA at an operative level). 3) Visualization system The Visualization System is an extensive module pictured by a hexagon symbol and acts as an ultimate SCADA Vector of Communication for the support of the Incident Team [22]. As depicted in Fig. 3, the input of the Visualization System is extracted from three fundamental building blocks: the Risk Evaluation, the Automatic Countermeasures Selection and the Service Simulator - concatenate data from OCA (and the Operative Level Analysis) - by means of the Cyber Simulator. The Visualization System supports the SCADA Operators and Incident Manager, and extensions are possible towards any ICT Operators. Figure 4. SCADA architecture extracted from [15] focussed on detection correlation, online cyber analysis and visualization system B. Building blocks modelling Fig. 4 illustrates the holistic representation of the SCADA components realized by the two steps of the policy engineering schema. In this figure, we focus on three blocks advocated by [17] cyber detection/correlation, online cyber analysis and visualization system. Four additional blocks have been partially incorporated to support the case description: IDS, Honeypot, Operative Level Analysis, and the CI. In this model, we have afterwards considered the CP and PP amongst artefacts, respectively in blue and in red. Finally, these policies have been reformulated according to the syntax policy attributes from Table I and II, such as motivated by [2]. The DCD is modeled on the left size of Fig. 4 and is associated through two PPs with the IDS and the honeypots, respectively, by the Detection Module and the Correlation Application. The Alert Detection DB Slave Artifact at the application layer is determined, in turn, by the Analytical Function Policy Master artefact (illustrated in Table III using data from [2]) from the Online Cyber Analysis module. The OCA module is the central part of Fig. 4 and acts as a facilitator building block between the DCD and the Visualization System. The Confirmed Alert data object from its application layer acts as a Slave artifact associated with the Visualization Policy. Hence, this latter is logically of a permissive type and is bound to the Visualization Policy/Service master artefact. Moreover, three CP are associated to this artefact. The two first are related to the IDS Application and Honeypot Application (which are of Slave type – read access allowed) and the latter is directed towards the Visualization Policy/Service (which is of Master type – write access allowed). Finally, the last module of Fig. 4 is the Visualization System. This latter is sustained by a Slave type CP towards the CI Operators, and by a master type PP towards the CI Nodes.
  • 6. Table III. CP instantiation for the Analytical function policy master artifact Attribute ID Attribute Name CP-Ma-art Organization policy/Service (pII2) CP-S-art Alert/Detection Database (DB a.dd) CP-Ma-Com ONLINE CYBER ANALYSIS CP-S-Com CYBER DETECTION AND CORRELATION CP-Ru Policy:: pII2, DB a.dd, if Act1On=3 than DB upgrade field DB a.add correlation list else unchange CP-TI Probs’ flg activate (Act3On) CP-UC Any time, sector covered plant 2. CP-prior Probs’ priority (From Act1 to Act9) V. RELATED WORKS The main related work consists in a framework for assessing the maintainability using EAM proposed by [23] which sustains flexible systems maintenance by supporting the SCADA operators to assess the management of the architecture. In line with EAM, [24] provides a solution to develop and adapt the security analysis framework for the architectural language and [25] refines the monitoring paradigm using EAM. [26] tackles the visualization through real-time SCADA and very large-scale integration (VLSI) monitoring interface, such as underlined by [27]. Cyber security policy has been reviewed by [3] who summarizes cyber security problems and the possible existence of vulnerabilities. This was correlated by [17, 19 and 20] who strengthen new policy EAM based on modelling needs as well as on bound exploitation perspectives. VI. CONCLUSIONS The huge amount of information managed by CI argues for the support of cybernetic SCADA which behaves as a very complex and sophisticated system. This later supports human operators in monitoring and governing the system security by elaborating the operational policies amongst the architecture components. This paper explores the usage of EAM to construct an integrated SCADA metamodel dedicated to these components’ artefacts and structured according to (1) three layers of abstraction, namely: Organization, Application, and Technical layer and (2) two semantically consistent types of policies: the Permissive Policy and the Cognitive Policy. The results of the SCADA modelling and policy engineering approach constitute, as illustrated by the case study, a global analytical tool for the SCADA operators which rely on a rational and unified component security based architecture to continuously monitor and manipulate the policy attributes acknowledging their impact on the whole CI system. ACKNOWLEDGMENT The research is funded by the CockpitCI project within the 7th framework Programme of the European Union (topic SEC- 2011.2.5-1 – Cyber-attacks against critical infrastructures). REFERENCES [1] Briesemeister, L., et al. Detection, correlation, and visualization of attacks against critical infrastructure systems, 8th PST, 2010, Canada. [2] Blangenois, J., Guemkam, G., Feltus, C., Khadraoui, D., Organizational Security Architecture for Critical Infrastructure, 8th International Workshop on Frontiers in Availability, Reliability and Security, ARES 2013, Regensburg, Germany [3] Tan, S. Electric Power Automation Control System Based on SCADA Protocols. Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. Springer London, 2013. [4] Lankhorst, M. ArchiMate language primer, 2004. [5] Zachman, J. A. 2003. The Zachman Framework For Enterprise Architecture: Primer for Enterprise Engineering and Manufacturing. Engineering, no. July: 1-11. [6] Li, D., Serizawa, Y., Kiuchi, M. Concept Design for a Web Based Supervisory Control and Data-Acquisition (SCADA) System, IEEE PES Transmission and Distribution Conference, Yokohama, 2002, pp. 32-36. [7] Baskerville, R., Siponen, M. (2002). An information security meta-policy for emergent organizations. Logistics of Information Management, 15(5/6) pp. 337-46. [8] Chang, D., Patra, A., Bagepalli, N., et al. Zone-Based Firewall Policy Model for a Virtualized Data Center. U.S. Patent No 20,130,019,277. [9] Guemkam, G., Feltus, C., Bonhomme, C., Schmitt, P., Khadraoui, D., Guessoum, Z. Reputation based Dynamic Responsibility to Agent for Critical Infrastructure, IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 22-27/8/2011, Lyon, France. doi>10.1109/WI-IAT.2011.194 [10] Bonhomme, C., Feltus, C., Khadraoui, D. Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management, ARES 2011, Vienna, Austria. DOI: 10.1109/ARES.2011.43 [11] UML 2 ( http://www.uml.org/) [12] Xu, W., Zhang, X., and Jahn, G. Towards system integrity protection with graph-based policy analysis. In : Data and Applications Security XXIII. Springer Berlin Heidelberg, 2009. p. 65-80. [13] Doherty et al.. (2009). The information security policy unpacked: A critical study of the content of university policies. IJIM 29(6) [14] Barth, A et al. (2009). Securing frame communication in browsers. Communications of the ACM, 52(6), pp. 83-91. [15] Nicholson, A. et al. (2012) SCADA security in the light of Cyber- Warfare. Computers and Security , 31 (4), pp. 418-436. [16] Maj, S. P., Makasiranondh, W., & Veal, D. (2010). An Evaluation of Firewall Configuration Methods. IJCSNS, 10(8), 1. [17] Briesemeister, L., Cheung, S., Lindqvist, U., & Valdes, A. (2010, August). Detection, correlation, and visualization of attacks against critical infrastructure systems. In Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on (pp. 15-22). IEEE. [18] Rakocevic, V., et al. Computational intelligence in a real-time SCADA system to monitor and control continuous casting of steel billets. Systems, Man and Cybernetics, 1995. IEEE, Vol. 2. [19] Daryabar, F., et al., Towards secure model for SCADA systems, International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 60, 64, 2012. [20] Gill, R., Smith, J., & Clark, A. (2006, January). Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. In Proceedings of the 2006 Australasian workshops on Grid computing and e-research-Volume 54 (pp. 221-230). Australian Computer Society, Inc. [21] Fink, G. A., et al. Visualizing cyber security: Usable workspaces. Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. IEEE, 2009. [22] Kitamura, M., Kojima, T., & Nishida, S. (2006). SCADA Data Visualization Using Equipment Graphs. IEEE Transactions on Electronics, Information and Systems, p. 126, pp.788-796. [23] Lagerström, R. Analyzing system maintainability using enterprise architecture models. Proceedings of the 2nd Workshop on Trends in Enterprise Architecture Research (TEAR 2007). [24] Ekstedt, M., Sommestad, T., Enterprise architecture models for cyber security analysis, PSCE '09. IEEE/PES, 1,6, 15-18 March 2009 [25] Stanescu, A. M. et al. Supervisory control and data acquisition for virtual enterprise, IJPR, Vol. 40, Iss. 15, 2002. [26] Qiu, B., et al. "Internet-based SCADA display system." Computer Applications in Power, IEEE 15.1 (2002): pp. 14-19. [27] Constantinescu, C. Trends and challenges in VLSI circuit reliability. Micro, IEEE 23.4 (2003): pp. 14-19.