Use this URL to cite or link to this record in EThOS:
Title: A holistic cyber-protection approach for industrial control systems based on systems theory : cyber security in ICSs
Author: Spyridopoulos, Theodoros
ISNI:       0000 0004 6056 7674
Awarding Body: University of Bristol
Current Institution: University of Bristol
Date of Award: 2016
Availability of Full Text:
Access from EThOS:
Being the cornerstone of today's Industry, Industrial Control Systems (ICSs) play an important role in the overall function and quality of modern society. Their use to control critical processes within the Industry (power production, transportation, manufacturing etc.) makes them an integral part of the Critical National Infrastructure (CNI), as defined by the European Council (2008), rendering thereby their protection a process of critical importance. Traditionally, ICSs have been operated as closed, isolated systems. However, the connection of contemporary ICS installations with external networks, including the corporate network and the Internet, along with the introduction of conventional off-the-self technologies, has exposed the once isolated systems to a rapidly evolving yet new to them cyberthreat landscape. Their critical nature further complicates the situation making them an attractive target for various attack vectors and threat agents. Traditional cyber-security methods seem inadequate since they are tailored to the specific corporate needs ignoring the demanding nature of ICSs. Nevertheless, due to the increased cost of designing and applying new cyber-protection methods, the majority of cyber-security solutions used nowadays in the Industry are mainly adaptations of traditional corporate-oriented methods (Giannopoulos et aI., 2012), raising thus significant challenges that the research community has to address. This thesis presents novel cyber-security approaches, tailored to the particular nature of ICSs. The developed methods take into account both the increased cybersecurity needs in this critical area and the related costs, offering optimal cost efficient cyber-security solutions. Stafford Beer's Viable System Model (VSM) was used as a vehicle to analyse the behaviour of ICSs and identify the areas where cost-efficient cyber-protection methods are in need (Stafford, 1984). Driving the research into those areas a series of cyber-protection methods were developed using system theory-base.d techniques such as game theory and system dynamics. Those methods include a cost-efficient cyber-security model against the malware spread within ICSs and a cost-efficient model for the protection against Denial of Service (DoS)/ Distributed Denial of Service (DDoS) attacks. Building on the same premises a novel ICS-oriented cyber-security risk management method was developed based on the Viable System Model and game theory. i
Supervisor: Not available Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID:  DOI: Not available