Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Modelling Availability Risks of IT Threats in Smart Factory Networks - A Modular Petri Net Approach

 
: Berger, Stephan; Bogenreuther, Maximilan; Häckel, Björn; Niesel, Oliver

:
Volltext (PDF; )

Twenty-Seventh European Conference on Information Systems, ECIS 2019. Proceedings : June 8-14, 2019, Stockholm-Uppsala, Sweden
AIS Electronic Library (AISeL), 2019
ISBN: 978-1-7336325-0-8
Paper 60, 18 S.
European Conference on Information Systems (ECIS) <27, 2019, Stockholm-Uppsala>
Englisch
Konferenzbeitrag, Elektronische Publikation
Fraunhofer FIT ()
Smart Factory Network; information network; production network; availability risks; Attack Propagation; petri nets

Abstract
In manufacturing, concepts like the Internet of Things (IoT) or Cyber-physical Systems (CPS) accelerate the development from traditional production facilities towards smart factories. Thereby, emerging digital technologies increasingly connect information networks with production processes, forming complex smart factory networks. Due to their reliance on information flows and the high degree of cross-linking, these networks are, in particular, vulnerable to availability risks caused by attacks and errors. To address this problem, we aim to identify and analyse availability threats by developing a modelling approach that depicts specific characteristics of smart factory networks. Based on modelling requirements derived from a literature review, we propose a modular Petri net approach. To iteratively revise and validate our model, we followed established evaluation principles and conducted evaluation rounds with industry experts and other researchers. To demonstrate the usefulness and applicability of our model, we simulated one real-world use case and two planned extensions of a mechanical engineering company. Our model depicts information-based dependencies within smart factory networks and allows for the simulation and analysis of threat propagation. Thereby, it enables both researchers and practitioners to identify critical network connections and components, serving as a basis for layout decisions and IT security mitigation measures.

: http://publica.fraunhofer.de/dokumente/N-559062.html