Concluding, the exploitability factor of an attack-
/system combination is defined as produced of two
factors. The first factor is determined by analysing the
attack vector, if applicable. Here, all attacks, which
are required by the currently analysed attack must
have an executability- and exploitability factor of 1.
If the attacks contained in the vectors do also required
other attacks to be performed in advanced, their
factors must also be 1 throughout. If one attack within
the chain holds a value of 0, the vector is not
applicable for this attack-/system combination.
Overall, this can be realized as iterative verification
process. The second parameter of the exploitability
product is determined by the result of the evaluation
formula, which leads to a value of true (=1) or false.
The data model (Figure 4) contains the necessary
attributes to evaluate the relationship between the
system- and attack-objects regarding the
exploitability potential. However, this attribute can
also be empty, which indicates, that this attack does
not require any other attack to being performed in
advance. Additionally, the attack object is extended
with a function (isExploitable), which takes a set of
measurements provided by the system object and
returns true or false by running through the formula.
To illustrate the integration of measurements, we
have refined the system type Vehicle of the car
sharing domain accordingly, as shown in Figure. 6.
4.4 The Scalability of Attacks
As highlighted in the problem statement, CPS
showcase a variety of characteristics, which have the
potential to significantly impact the overall level of
security in a negative way. We integrate these aspects
by extending the attack- and system objects within the
data model (Figure 4) with a Scalability attribute.
This attribute integrates events, properties or
characteristics of the interacting systems, which
increase the likelihood of being exploited by a certain
attack or the severity of them. To this end, we provide
a top-ten list of scalability factors (SF). This list has
been generated based on the previously described key
challenges proposed by CPS, but can easily be
tailored to the needs according to the ecosystem:
- SF-01: The system is geographically constrained
- SF-02: The system is limited in physical resources
- SF-03: The system implements or requires safety-
relevant functionality
- SF-04: The system interacts with humans
- SF-05: The system interacts with other type of
systems
- SF-06: The system processes different type of
assets
- SF-07: The system interacts with an unknown
number of systems or depends on their input
- SF-08: The system uses unsecure, unknown or
unstable communication links
- SF-09: The system changes its operational context
- SF-10: The system implements or depends on a
physical process
Consequently, the scalability attribute of the
system object contains all statements, which are given
for this particular system. However, equal to the
capability and condition attribute, this property can
also be empty. On the other side, these scalability
attributes define, whether they increase the likelihood
or impact of a given attack object. Therefore, to
evaluate this factor, the two scalability attributes of an
attack-/system combination must be cross-checked
for common entries. For each matching entry, the
overall scalability factor for the concluding
evaluation of this attack-/system combination is
increased by 0.1. We advise to use a top-10 list of
scalability statements for each security evaluation.
Consequently, the value of this factor ranges from
zero to 1.
4.5 The Effect of Attacks on Assets
If an attack is eventually able to exploit a system, we
must determine the potential harm this might cause.
If an attack might not be able to lead to any harm, the
necessity to implement counter measurements for this
particular attack might not be given. For this, we
evaluate the concrete effect the attack has on all assets
owned or accessed by the exploited system by using
a set of classification rules. In our definition, an asset
is a piece of information or functionality, which holds
a certain value from the business process perspective.
Table 2: Asset Classification Schemata.
Value Description
High
(=3)
The asset contains sensitive or critical data or
functionality, as the business process cannot be
fulfilled as designed.
Medium
(=2)
The asset holds valuable information, but the core
functionality or data can still be provided.
Low
(=1)
The asset is replaceable or sustainable by other
assets, while it does also not contain sensitive
information or logic.
n/a
(=0)
The asset does not hold any value. Its non-existence
of the asset does not lead to any limitation.
This classification also allows us to highlight the
importance of certain assets, e.g. safety-relevant
functionality. We define four classes, ranging from
not applicable (n/a), Low, Medium to High, as listed