IIC Journal of Innovation 9th Edition | Page 135

The Resilience Model Supporting IIoT System Trustworthiness
computers supporting server applications reliably utilized with a minimum amount of downtime . They operate by using high availability software to harness redundant computers in groups or clusters that provide continued service when system components fail .
Input data in the IT context ( DX ): This factor is the most difficult to influence because of the fact that the attack is concealed in requests that look ordinary , but taken together , may cause a failure . Filtering alone does not work for the volumetric attacks ( L2 ) at all and is not useful for mitigating L3 and L4 attacks . It may be helpful to withstand some of L7 attacks and for the surgical strike at attack sources identified due to the environment monitoring .
Environment represented in the IT context ( DSIoT ): This factor also plays a supportive role . At the design phase , the architect may incorporate the means for the monitoring and damage assessment , dynamic mapping and profiling which would help to detect the attack at the early stage .
System requirements ( Z ): Changing the system requirement to the resilience of the e-commerce website represents the next level of approaching the problem . During some periods , the uninterrupted execution may be more important than it usually is . For online stores , the simplest example is the time before some public holidays and periods of sale . For the payment system , this is the time period during which it expects significant transactions . Requirements may depend on the time of the day in different time zones , the season , political landscape and processes , and so on .
Thus , the listed measures must be constantly updated by the operations team to keep up to date with the latest threats . DDoS tactics change almost daily and the supporting personnel must be prepared to update services to the latest threats .
CONCLUSION
The resilience aspect is one of the most demanded IIoT system characteristics . Often resilience is achieved by designing the system so that failures are compartmentalized . If a single function fails it should not cause other functions to fail , and there should be alternate ways of performing the failed function in the design that can be invoked automatically , immediately and reliably . Resilience may also be achieved through the dynamic adaptation of the system characteristics to the changing adverse conditions and even through adaptation of requirements to the system behavior ( for example , when one of the aspects comes to the forefront ).
The proposed semiformal model of the IIoT system behavior approaches the problem with the clear understanding of which techniques facilitate the resilience of the IIoT system , and which are not useful . It may be further used as the basis for the method of identifying appropriate approaches for enhancing IIoT system resilience .
The key takeaways from the proposed model are :
1 . The high-level resilience metrics for cyber resilience are the time periods : the period during which the system is capable of withstanding the
September 2018 - 130 -