5.2 Applicability of This Method
The requirement for monitoring in fuzzing studies
and certification schemes is "to cover all outputs."
The scope is limited even for monitoring tests in local
networks that are not cloud-based. When applying the
virtual extension pattern to the cloud in the proposed
method, it is possible to reproduce the same
monitoring as for testing in a local area network by
increasing the number of devices with remote I/O and
DAQ. However, even test devices that are certified
tools in the certification system have GUI and
physical limitations on the number of monitored
points. For example, a digital output is physically
limited to four contacts. If many contacts are to be
monitored to improve diagnostic accuracy, some kind
of encoding and expansion of the monitoring GUI
may be necessary.
In this test environment, latency was relatively
small, and jitter issues did not affect the results.
Further empirical research is needed to test the
response to jitter errors in areas with weak radio
waves and poor network conditions.
When considering actual use cases of diagnostics,
it is also necessary to consider the increased burden
on testers who temporarily set up DAQ and other
equipment in the local system. As for the testers, they
will have to carry in the monitoring equipment, install
it, set it up, and witness the implementation of the test,
which will be costly in proportion to the scale of the
target to be monitored. When determining the
parameters that define the monitoring conditions, if
the parameters are optimized for the local
environment, the burden on local workers will
increase, which will not lead to a reduction in the cost
of the test. Establishing a methodology to reduce the
total cost, including the burden on workers, is also
considered necessary.
Developing strategies to minimize the workload
on local testers and optimize the overall testing
process will be crucial in ensuring the success of the
proposed method. This could involve creating
comprehensive guidelines and automating certain
aspects of the installation and monitoring processes to
streamline the workflow. Additionally, exploring
innovative ways to expand the monitoring GUI and
improve diagnostic accuracy without overwhelming
the system or personnel will be essential.
6 CONCLUSION
In this paper, we presented a novel method for remote
security assessment of critical infrastructure systems
using virtual extension design patterns. The proposed
method addresses the challenges and limitations
faced by traditional remote security assessment
approaches, including network stability, reachability
of Layer 2 data, and the monitoring of essential
functions in real time.
Through the implementation and evaluation of the
proposed method, we demonstrated its ability to
effectively address these challenges in a simulated
environment. The evaluation experiments showed
promising results, with the proposed method
successfully handling aborted transmission of
abnormal data, ensuring proper output monitoring to
be diagnosed, and maintaining consistent
performance in various testing scenarios.
However, further research and development are
needed to optimize the proposed method for real-
world applications. This includes expanding the
scope of monitoring, addressing latency and jitter
issues, and minimizing the burden on local workers
during the testing process. Developing
comprehensive guidelines and automating certain
aspects of the installation and monitoring processes
will be essential in streamlining the workflow and
reducing overall costs.
In conclusion, the proposed method offers a
promising solution for the remote security assessment
of critical infrastructure systems. By addressing the
existing challenges and limitations, this method can
significantly enhance cybersecurity and protect
critical infrastructures in the face of ever-evolving
threats.
Table 1: Relationship between evaluation experiments and tasks.
Ex 3 Ex 2 Ex 1
(a-1) The same tests were conducted as those in the local area.
(a-2) The same number of tests were conducted in the local area.
**(a)Interruption
(b-2) Equipment output was properly monitored.
(b-3) Anomalies as small as 0.1 second were also supplemented.
**
(b)Interruption
(c-2) Equipment output was properly monitored.
(c-3) Anomalies as small as 0.1 second were also captured.
**
(c)Continuation
(d-3) Operations of about 0.1 second were also captured.
*
(d)Confirmation