Search

US-12627671-B2 - Shared risk assessment and clustering for industrial IOT applications

US12627671B2US 12627671 B2US12627671 B2US 12627671B2US-12627671-B2

Abstract

In one embodiment, a method may access a plurality of Industrial Internet of Things (IIoT) devices within a network. The method may determine a shared risk model associated with the plurality of IIoT devices within the network. The method may determine, using the shared risk model, a shared risk value for each of the plurality of IIoT devices within the network. The method may determine, using the shared risk model, a plurality of associated clusters of IIoT devices within the network based on the shared risk value for each of the plurality of IIoT devices within the network. The method may determine an associated risk minimization for each of the plurality of IIoT devices within the network based on the plurality of associated clusters of IIoT devices within the network and the shared risk value for each of the plurality of IIoT devices within the network.

Inventors

  • Navdeep Sood
  • Praveen Kumar

Assignees

  • CISCO TECHNOLOGY, INC.

Dates

Publication Date
20260512
Application Date
20230803

Claims (18)

  1. 1 . An apparatus for managing a plurality of Industrial Internet of Things (IIoT) devices in a network, comprising: one or more processors; and one or more computer-readable non-transitory storage media comprising instructions that, when executed by the one or more processors, cause one or more components of the apparatus to perform operations comprising: accessing the plurality of IIoT devices within the network; receiving information from the plurality of IIoT devices; determining a shared risk model associated with the plurality of IIoT devices within the network based on the received information; determining, using the shared risk model, a shared risk value for each of the plurality of IIoT devices within the network; determining, using the shared risk model, a plurality of associated clusters of the plurality of IIoT devices within the network based on the shared risk value for each of the plurality of IIoT devices within the network; and determining, using the shared risk model, an associated risk minimization for each of the plurality of IIoT devices within the network based on the plurality of associated clusters of IIoT devices within the network and the shared risk value for each of the plurality of IIoT devices within the network, and wherein: the associated risk minimization includes a corrective action for the plurality of IIoT devices based on the shared risk value to reduce shared risk for a critical target asset, and the associated risk minimization includes a brown field device placement decision for a target new device within the network by evaluating potential hazards associated with the target new device in order to minimize shared risk.
  2. 2 . The apparatus of claim 1 , wherein the plurality of IIoT devices include two or more of cameras, badge readers, AC control systems, sensors, computers, switches, and routers.
  3. 3 . The apparatus of claim 1 , wherein the one or more components of the apparatus perform operations further comprising: determining the shared risk model based on a shared risk of common power source, a shared risk of using common fiber/cable, a shared risk of common hardware line cards hosting multiple uplinks, and a shared risk of common device location; and determining, using the shared risk model, an aggregate shared risk link group value for a leaf node of a shared risk link group in the shared risk model based on a combination of a shared risk value of a root node, one or more shared risk values of one or more twig nodes, and a shared risk value of the leaf node, wherein the shared risk link group includes the root node, the one or more twig nodes, and the leaf node.
  4. 4 . The apparatus of claim 1 , wherein: the shared risk model is shared risk tree-twig-leaf model which defines shared risk at each layer of a hierarchical model.
  5. 5 . The apparatus of claim 1 , wherein: the shared risk model has one or more tree root layers, one or more tree twig layers, and one or more tree leaf layers.
  6. 6 . The apparatus of claim 5 , wherein: the one or more tree root layers include one or more power supply feeder banks, fibers/interconnections, and hosting facility associated with shared risk of a common power source and shared risk of using common fiber/cable, the one or more tree twig layers include one or more routers and switches associated with a shared risk of common IIoT router backbone layer, a shared risk of common IIoT switch access layer, and a shared risk of common IIoT hardware modules/uplink interfaces risk, and the one or more tree leaf layers include one or more sensors associated with the shared risk of common power source, the shared risk of using common fiber/cable, a shared risk of common hardware line cards hosting multiple uplinks, and a shared risk of common device location.
  7. 7 . The apparatus of claim 1 , wherein each shared risk entity of the shared risk model is represented by a shared risk parameter name and a shared risk parameter key value pair.
  8. 8 . The apparatus of claim 7 , wherein the shared risk parameter key value pair for each shared risk entity of the shared risk model is an associated positive integer based numerical value assigned by a user or a controller.
  9. 9 . The apparatus of claim 7 , wherein the shared risk parameter name is one selected from a group consisting of the shared risk parameter name is one selected from a group consisting of “Physical Infra,” “Shared Router,” “Shared Switch,” “IntrLM,” and “Sensr”.
  10. 10 . A computer-implemented method executed by a security control system for managing a plurality of Industrial Internet of Things (IIoT) devices in a network, the method comprising: accessing the plurality of IIoT devices within the network; receiving information from the plurality of IIoT devices; determining a shared risk model associated with the plurality of IIoT devices within the network based on the received information; determining, using the shared risk model, a shared risk value for each of the plurality of IIoT devices within the network; determining, using the shared risk model, a plurality of associated clusters of the plurality of IIoT devices within the network based on the shared risk value for each of the plurality of IIoT devices within the network; and determining, using the shared risk model, an associated risk minimization for each of the plurality of IIoT devices within the network based on the plurality of associated clusters of IIoT devices within the network and the shared risk value for each of the plurality of IIoT devices within the network, and wherein: the associated risk minimization includes a corrective action for the plurality of IIoT devices based on the shared risk value to reduce shared risk for a critical target asset, and the associated risk minimization includes a brown field device placement decision for a target new device within the network by evaluating potential hazards associated with the target new device in order to minimize shared risk.
  11. 11 . The computer-implemented method of claim 10 , wherein the plurality of IIoT devices include two or more of cameras, badge readers, AC control systems, sensors, computers, switches, and routers.
  12. 12 . The computer-implemented method of claim 10 , further comprising: determining the shared risk model based on a shared risk of common power source, a shared risk of using common fiber/cable, a shared risk of common hardware line cards hosting multiple uplinks, and a shared risk of common device location; and determining, using the shared risk model, an aggregate shared risk link group value for a leaf node of a shared risk link group in the shared risk model based on a combination of a shared risk value of a root node, one or more shared risk values of one or more twig nodes, and a shared risk value of the leaf node, wherein the shared risk link group includes the root node, the one or more twig nodes, and the leaf node.
  13. 13 . The computer-implemented method of claim 10 , wherein: the shared risk model is shared risk tree-twig-leaf model which defines shared risk at each layer of a hierarchical model.
  14. 14 . The computer-implemented method of claim 10 , wherein: the shared risk model has one or more tree root layers, one or more tree twig layers, and one or more tree leaf layers.
  15. 15 . The computer-implemented method of claim 14 , wherein: the one or more tree root layers include one or more power supply feeder banks, fibers/interconnections, and hosting facility associated with shared risk of common power source and shared risk of using common fiber/cable, the one or more tree twig layers include one or more routers and switches associated with a shared risk of common IIoT router backbone layer, a shared risk of common IIoT switch access layer, and a shared risk of common IIoT hardware modules/uplink interfaces risk, and the one or more tree leaf layers include one or more sensors associated with the shared risk of common power source, the shared risk of using common fiber/cable, a shared risk of common hardware line cards hosting multiple uplinks, and a shared risk of common device location.
  16. 16 . The computer-implemented method of claim 10 , wherein each shared risk entity of the shared risk model is represented by a shared risk parameter name and a shared risk parameter key value pair.
  17. 17 . The computer-implemented method of claim 16 , wherein: the shared risk parameter key value pair for each shared risk entity of the shared risk model is an associated positive integer based numerical value assigned by a user or a controller, and the shared risk parameter name is one selected from a group consisting of “Physical Infra,” “Shared Router,” “Shared Switch,” “IntrLM,” and “Sensr”.
  18. 18 . A non-transitory computer-readable medium comprising instructions that are configured, when executed by a processor, to execute a method for managing a plurality of Industrial Internet of Things (IIoT) devices in a network, the method comprising: accessing the plurality of IIoT devices within the network; receiving information from the plurality of IIoT devices; determining a shared risk model associated with the plurality of IIoT devices within the network based on the received information; determining, using the shared risk model, a shared risk value for each of the plurality of IIoT devices within the network; determining, using the shared risk model, a plurality of associated clusters of the plurality of IIoT devices within the network based on the shared risk value for each of the plurality of IIoT devices within the network; and determining, using the shared risk model, an associated risk minimization for each of the plurality of IIoT devices within the network based on the plurality of associated clusters of IIoT devices within the network and the shared risk value for each of the plurality of IIoT devices within the network, and wherein: the associated risk minimization includes a corrective action for the plurality of IIoT devices based on the shared risk value to reduce shared risk for a critical target asset, and the associated risk minimization includes a brown field device placement decision for a target new device within the network by evaluating potential hazards associated with the target new device in order to minimize shared risk.

Description

TECHNICAL FIELD The present disclosure relates generally to automated shared risk assessment, and, more particularly, to shared risk groups for a plurality of devices in Industrial Internet of Things (IIoT) networks. BACKGROUND Industrial Internet of Things (IIoT) is a system of interconnected objects, such as machines and devices, that may transfer or exchange information over a network with no human intervention. The IIoT network may include a plurality of devices to collect, send, and act on data in different industries. For example, the IIoT network may include cameras, badge readers, and AC control systems in an office or a building to exchange information with each other and evaluate the information. The cybersecurity infrastructure of the IIoT network is susceptible to malfunctions and/or failures of IIoT devices within the network. The malfunctioned or failed IIoT devices may cause catastrophic consequences in high risk and potentially life-threatening situations. Thus, these problems may be acute in various IIoT networks associated with high-risk systems, such as manufacturing, transportation, oil and gas, power generation and transmission, mines, and ports, etc. Furthermore, the downtime of some normal IIoT or non-industrial devices may also result in inconveniences for a user in non-emergent situations. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 illustrates an example security control system 100 for use in a product. FIG. 2 illustrates an example shared risk group 200. FIG. 3 illustrates an example shared risk tree-twig-leaf model 300. FIG. 4 illustrates an example shared risk tree-twig-leaf model 300 with failed nodes. FIG. 5 illustrates an example IIoT network 500. The IIoT network 500 includes two power supply feeder banks 502. FIG. 6 illustrates the IIoT network 500 based on a shared risk of a common power supply source. FIG. 7 illustrates an example IIoT control system 700. FIG. 8 illustrates an example method for determining a shared risk model for a plurality of IIoT devices. DESCRIPTION OF EXAMPLE EMBODIMENTS Overview In one or more embodiments, an apparatus may comprise one or more processors, and one or more computer-readable non-transitory storage media coupled the to one or more of the processors. The one or more computer-readable non-transitory storage media may comprise instructions operable when executed by one or more of the processors to cause one or more components of the apparatus to perform operations to access a plurality of IIoT devices within a network. The apparatus is configured to determine a shared risk model associated with the plurality of IIoT devices within the network. The apparatus is configured to use the shared risk model to determine a shared risk value for each of the plurality of IIoT devices within the network. The apparatus is configured to use the shared risk model to determine a plurality of associated clusters of the plurality of IIoT devices within the network based on the shared risk value for each of the plurality of IIoT devices within the network. The apparatus is configured to use the shared risk model to determine an associated risk minimization for each of the plurality of IIoT devices within the network based on the plurality of associated clusters of IIoT devices within the network and the shared risk value for each of the plurality of IIoT devices within the network. In one or more embodiments, a method, by an apparatus, may access a plurality of IIoT devices within a network. A shared risk model associated with the plurality of IIoT devices within the network is determined. The shared risk model determines a shared risk value for each of the plurality of IIoT devices within the network. The shared risk model may determine a plurality of associated clusters of the plurality of IIoT devices within the network based on the shared risk value for each of the plurality of IIoT devices within the network. The shared risk model determines an associated risk minimization for each of the plurality of IIoT devices within the network based on the plurality of associated clusters of IIoT devices within the network and the shared risk value for each of the plurality of IIoT devices within the network. In one or more embodiments, one or more computer-readable non-transitory storage media may embody software that is operable, when executed by a processor, to access a plurality of IIoT devices within a network. The software may be operable, when executed, to determine a shared risk model associated with the plurality of IIoT devices within the network. The software may be operable, when executed, to use the shared risk model to determine a shared risk value for each of the plurality of IIoT devices within the network. The software may be operable, when executed, to use the shared risk model to determine a plurality of associated clusters of the plurality of IoT devices within the network based on the shared risk value for each of the plurality of IoT devices wi