A Systematic Analysis of Security Metrics for Industrial Cyber–Physical Systems
Nowadays, as the cyber-threat landscape is evolving and digital assets are proliferating and becoming more and more interconnected with the internet and heterogeneous devices, it is fundamental to be able to obtain a sensible measure of the security of devices, networks, and systems. Industrial cybe...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2024-04, Vol.13 (7), p.1208 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 7 |
container_start_page | 1208 |
container_title | Electronics (Basel) |
container_volume | 13 |
creator | Gori, Giacomo Rinieri, Lorenzo Melis, Andrea Al Sadi, Amir Callegati, Franco Prandini, Marco |
description | Nowadays, as the cyber-threat landscape is evolving and digital assets are proliferating and becoming more and more interconnected with the internet and heterogeneous devices, it is fundamental to be able to obtain a sensible measure of the security of devices, networks, and systems. Industrial cyber–physical systems (ICPSs), in particular, can be exposed to high operational risks that entail damage to revenues, assets, and even people. A way to overcome the open question of measuring security is with the use of security metrics. With metrics it is possible to rely on proven indicators that benchmark systems, identify vulnerabilities, and show practical data to assess the risk. However, security metrics are often proposed with specific contexts in mind, and a set of them specifically crafted for ICPSs is not explicitly available in the literature. For this reason, in this work, we analyze the current state of the art in the selection of security metrics and we propose a systematic methodology to gather, filter, and validate security metrics. Then, we apply the procedure to the ICPS domain, gathering almost 300 metrics from the literature, analyzing the domain to identify the properties useful to filter the metrics, and applying a validation framework to assess the validity of the filtered metrics, obtaining a final set capable of measuring the security of ICPSs from different perspectives. |
doi_str_mv | 10.3390/electronics13071208 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_3037498735</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A790017886</galeid><sourcerecordid>A790017886</sourcerecordid><originalsourceid>FETCH-LOGICAL-c311t-e797a250265408b667928c6444e0ae53015d49a3f504066eaf64e0e1272157013</originalsourceid><addsrcrecordid>eNptUE1PwzAMrRBITLBfwCUS5w4naZvmWE18TBoCNDhXWeZApq4ZSXrojf_AP-SXEDQOHLAPtp_fe5KdZRcUZpxLuMIOdfSutzpQDoIyqI-yCQMhc8kkO_7Tn2bTELaQQlJec5hkTw1ZjSHiTkWrSdOrbgw2EGfICvXgbRzJPUafvIlxniz6zRDSqDoyH9fovz4-H9-SQifg4BPOsxOjuoDT33qWvdxcP8_v8uXD7WLeLHPNKY05CikUK4FVZQH1uqqEZLWuiqJAUFhyoOWmkIqbEgqoKlSmShukTDBaCqD8LLs8-O69ex8wxHbrBp8OCC0HLgpZC14m1uzAelUdtrY3LnqlU25wZ7Xr0diEN0ICUFHXVRLwg0B7F4JH0-693Sk_thTan3-3__ybfwO9iXV4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3037498735</pqid></control><display><type>article</type><title>A Systematic Analysis of Security Metrics for Industrial Cyber–Physical Systems</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Gori, Giacomo ; Rinieri, Lorenzo ; Melis, Andrea ; Al Sadi, Amir ; Callegati, Franco ; Prandini, Marco</creator><creatorcontrib>Gori, Giacomo ; Rinieri, Lorenzo ; Melis, Andrea ; Al Sadi, Amir ; Callegati, Franco ; Prandini, Marco</creatorcontrib><description>Nowadays, as the cyber-threat landscape is evolving and digital assets are proliferating and becoming more and more interconnected with the internet and heterogeneous devices, it is fundamental to be able to obtain a sensible measure of the security of devices, networks, and systems. Industrial cyber–physical systems (ICPSs), in particular, can be exposed to high operational risks that entail damage to revenues, assets, and even people. A way to overcome the open question of measuring security is with the use of security metrics. With metrics it is possible to rely on proven indicators that benchmark systems, identify vulnerabilities, and show practical data to assess the risk. However, security metrics are often proposed with specific contexts in mind, and a set of them specifically crafted for ICPSs is not explicitly available in the literature. For this reason, in this work, we analyze the current state of the art in the selection of security metrics and we propose a systematic methodology to gather, filter, and validate security metrics. Then, we apply the procedure to the ICPS domain, gathering almost 300 metrics from the literature, analyzing the domain to identify the properties useful to filter the metrics, and applying a validation framework to assess the validity of the filtered metrics, obtaining a final set capable of measuring the security of ICPSs from different perspectives.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics13071208</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Analysis ; Automation ; Biometrics ; Classification ; Cyber-physical systems ; Cybersecurity ; Cyberterrorism ; Data encryption ; Defense mechanisms ; Embedded systems ; Online assets ; Risk assessment ; Security ; Software</subject><ispartof>Electronics (Basel), 2024-04, Vol.13 (7), p.1208</ispartof><rights>COPYRIGHT 2024 MDPI AG</rights><rights>2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c311t-e797a250265408b667928c6444e0ae53015d49a3f504066eaf64e0e1272157013</cites><orcidid>0009-0002-3218-6703 ; 0000-0002-5560-9871 ; 0000-0002-3962-5513 ; 0000-0002-6669-8072 ; 0000-0002-0101-2551 ; 0000-0003-1767-7256</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids></links><search><creatorcontrib>Gori, Giacomo</creatorcontrib><creatorcontrib>Rinieri, Lorenzo</creatorcontrib><creatorcontrib>Melis, Andrea</creatorcontrib><creatorcontrib>Al Sadi, Amir</creatorcontrib><creatorcontrib>Callegati, Franco</creatorcontrib><creatorcontrib>Prandini, Marco</creatorcontrib><title>A Systematic Analysis of Security Metrics for Industrial Cyber–Physical Systems</title><title>Electronics (Basel)</title><description>Nowadays, as the cyber-threat landscape is evolving and digital assets are proliferating and becoming more and more interconnected with the internet and heterogeneous devices, it is fundamental to be able to obtain a sensible measure of the security of devices, networks, and systems. Industrial cyber–physical systems (ICPSs), in particular, can be exposed to high operational risks that entail damage to revenues, assets, and even people. A way to overcome the open question of measuring security is with the use of security metrics. With metrics it is possible to rely on proven indicators that benchmark systems, identify vulnerabilities, and show practical data to assess the risk. However, security metrics are often proposed with specific contexts in mind, and a set of them specifically crafted for ICPSs is not explicitly available in the literature. For this reason, in this work, we analyze the current state of the art in the selection of security metrics and we propose a systematic methodology to gather, filter, and validate security metrics. Then, we apply the procedure to the ICPS domain, gathering almost 300 metrics from the literature, analyzing the domain to identify the properties useful to filter the metrics, and applying a validation framework to assess the validity of the filtered metrics, obtaining a final set capable of measuring the security of ICPSs from different perspectives.</description><subject>Analysis</subject><subject>Automation</subject><subject>Biometrics</subject><subject>Classification</subject><subject>Cyber-physical systems</subject><subject>Cybersecurity</subject><subject>Cyberterrorism</subject><subject>Data encryption</subject><subject>Defense mechanisms</subject><subject>Embedded systems</subject><subject>Online assets</subject><subject>Risk assessment</subject><subject>Security</subject><subject>Software</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUE1PwzAMrRBITLBfwCUS5w4naZvmWE18TBoCNDhXWeZApq4ZSXrojf_AP-SXEDQOHLAPtp_fe5KdZRcUZpxLuMIOdfSutzpQDoIyqI-yCQMhc8kkO_7Tn2bTELaQQlJec5hkTw1ZjSHiTkWrSdOrbgw2EGfICvXgbRzJPUafvIlxniz6zRDSqDoyH9fovz4-H9-SQifg4BPOsxOjuoDT33qWvdxcP8_v8uXD7WLeLHPNKY05CikUK4FVZQH1uqqEZLWuiqJAUFhyoOWmkIqbEgqoKlSmShukTDBaCqD8LLs8-O69ex8wxHbrBp8OCC0HLgpZC14m1uzAelUdtrY3LnqlU25wZ7Xr0diEN0ICUFHXVRLwg0B7F4JH0-693Sk_thTan3-3__ybfwO9iXV4</recordid><startdate>20240401</startdate><enddate>20240401</enddate><creator>Gori, Giacomo</creator><creator>Rinieri, Lorenzo</creator><creator>Melis, Andrea</creator><creator>Al Sadi, Amir</creator><creator>Callegati, Franco</creator><creator>Prandini, Marco</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0009-0002-3218-6703</orcidid><orcidid>https://orcid.org/0000-0002-5560-9871</orcidid><orcidid>https://orcid.org/0000-0002-3962-5513</orcidid><orcidid>https://orcid.org/0000-0002-6669-8072</orcidid><orcidid>https://orcid.org/0000-0002-0101-2551</orcidid><orcidid>https://orcid.org/0000-0003-1767-7256</orcidid></search><sort><creationdate>20240401</creationdate><title>A Systematic Analysis of Security Metrics for Industrial Cyber–Physical Systems</title><author>Gori, Giacomo ; Rinieri, Lorenzo ; Melis, Andrea ; Al Sadi, Amir ; Callegati, Franco ; Prandini, Marco</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c311t-e797a250265408b667928c6444e0ae53015d49a3f504066eaf64e0e1272157013</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Analysis</topic><topic>Automation</topic><topic>Biometrics</topic><topic>Classification</topic><topic>Cyber-physical systems</topic><topic>Cybersecurity</topic><topic>Cyberterrorism</topic><topic>Data encryption</topic><topic>Defense mechanisms</topic><topic>Embedded systems</topic><topic>Online assets</topic><topic>Risk assessment</topic><topic>Security</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gori, Giacomo</creatorcontrib><creatorcontrib>Rinieri, Lorenzo</creatorcontrib><creatorcontrib>Melis, Andrea</creatorcontrib><creatorcontrib>Al Sadi, Amir</creatorcontrib><creatorcontrib>Callegati, Franco</creatorcontrib><creatorcontrib>Prandini, Marco</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gori, Giacomo</au><au>Rinieri, Lorenzo</au><au>Melis, Andrea</au><au>Al Sadi, Amir</au><au>Callegati, Franco</au><au>Prandini, Marco</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Systematic Analysis of Security Metrics for Industrial Cyber–Physical Systems</atitle><jtitle>Electronics (Basel)</jtitle><date>2024-04-01</date><risdate>2024</risdate><volume>13</volume><issue>7</issue><spage>1208</spage><pages>1208-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Nowadays, as the cyber-threat landscape is evolving and digital assets are proliferating and becoming more and more interconnected with the internet and heterogeneous devices, it is fundamental to be able to obtain a sensible measure of the security of devices, networks, and systems. Industrial cyber–physical systems (ICPSs), in particular, can be exposed to high operational risks that entail damage to revenues, assets, and even people. A way to overcome the open question of measuring security is with the use of security metrics. With metrics it is possible to rely on proven indicators that benchmark systems, identify vulnerabilities, and show practical data to assess the risk. However, security metrics are often proposed with specific contexts in mind, and a set of them specifically crafted for ICPSs is not explicitly available in the literature. For this reason, in this work, we analyze the current state of the art in the selection of security metrics and we propose a systematic methodology to gather, filter, and validate security metrics. Then, we apply the procedure to the ICPS domain, gathering almost 300 metrics from the literature, analyzing the domain to identify the properties useful to filter the metrics, and applying a validation framework to assess the validity of the filtered metrics, obtaining a final set capable of measuring the security of ICPSs from different perspectives.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics13071208</doi><orcidid>https://orcid.org/0009-0002-3218-6703</orcidid><orcidid>https://orcid.org/0000-0002-5560-9871</orcidid><orcidid>https://orcid.org/0000-0002-3962-5513</orcidid><orcidid>https://orcid.org/0000-0002-6669-8072</orcidid><orcidid>https://orcid.org/0000-0002-0101-2551</orcidid><orcidid>https://orcid.org/0000-0003-1767-7256</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2024-04, Vol.13 (7), p.1208 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_3037498735 |
source | MDPI - Multidisciplinary Digital Publishing Institute; EZB-FREE-00999 freely available EZB journals |
subjects | Analysis Automation Biometrics Classification Cyber-physical systems Cybersecurity Cyberterrorism Data encryption Defense mechanisms Embedded systems Online assets Risk assessment Security Software |
title | A Systematic Analysis of Security Metrics for Industrial Cyber–Physical Systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T08%3A22%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Systematic%20Analysis%20of%20Security%20Metrics%20for%20Industrial%20Cyber%E2%80%93Physical%20Systems&rft.jtitle=Electronics%20(Basel)&rft.au=Gori,%20Giacomo&rft.date=2024-04-01&rft.volume=13&rft.issue=7&rft.spage=1208&rft.pages=1208-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics13071208&rft_dat=%3Cgale_proqu%3EA790017886%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3037498735&rft_id=info:pmid/&rft_galeid=A790017886&rfr_iscdi=true |