IIC Journal of Innovation 9th Edition | Page 130

The Resilience Model Supporting IIoT System Trustworthiness
∀t∀s i ∃R ∗ ≠ R: P( U( F < ST, C, R ∗ >( D x, D SIoT)( t), Z) = TRUE An example of resource adaptation is increasing the resources to mitigate a DDoS attack. e) Environment adaptation ∀t∀s i ∃( D x, D SIoT) ∗ ≠( D x, D SIoT) ∶ P( U( F < ST, C, К >( D x, D SIoT) ∗( t), Z) = TRUE The system may be put into a restricted environment or an environment with different characteristics( such as a virtual machine), or the source of the disturbance may be removed from the environment.
Recover is to restore the mission or business functions during and after adversity.
In case the system, due to its exposure to adverse conditions, cannot restore its execution during some period of time, we consider its capability to recover after this period:
∀t∀s i ∃T RES: P( Y( t), Z ∗) = TRUE, P( Y( t + T RES), Z)
The recovery problem focuses on optimizing the restoration period T RES → min. It may be implemented by temporarily adjusting the parameters for the generic control function F; changing control algorithms, parameters of control and employing extra resources until conditions normalize.
According to the considered interpretation of the resilience goals, the following highlevel metrics for cyber resilience may be proposed in terms of the model:
-
T ad, the time period during which the
system is capable of withstanding the
adversity,
-
T suc, the time period during which
the system does not satisfy the set of
essential requirements because of
adversity, and
-
T RES, the time period during which
the system is capable of restoring its
functioning
during
and / or
after
adversity.
Classification of Resilience Techniques and Approaches
The Draft NIST Special Publication 800-160 VOLUME 2 considers the resilience approaches: Adaptive Response( AR 14), Analytic Monitoring( AM), Coordinated Defense( CD), Deception( De), Diversity( Di), Dynamic Positioning( DP), Dynamic Representation( DR), Non-Persistence( NP), Privilege Restriction( PR), Realignment( Ra), Redundancy( Re), Segmentation( Se), Substantiated Integrity( SI), Unpredictability( Up). Let’ s consider this list using the proposed model from the perspective of choosing the approaches and techniques according to existing constraints.
Applying a technique or approach from the list requires accountability of some characteristics and may entail a change in one or more parameters of the predicate P
14
This and the following acronyms for the approaches are not defined in the Draft NIST Special Publication 800-160 VOLUME 2. We introduce them here to use further in the table.
- 125- IIC Journal of Innovation