Cybersecurity risk assessment method of ICS based on attack-defense tree model

Author:

Wang Shuang1,Ding Lei2,Sui He3,Gu Zhaojun4

Affiliation:

1. Evaluation Center of Civil Aviation University of China, China

2. School of Computer Science and Technology, Civil Aviation University of China, China

3. Aeronautical Engineering Institute, Civil Aviation University of China, China

4. Department of Computer Science and Technology, Civil Aviation University of China, China

Abstract

Cybersecurity risk assessment is an important means of effective response to network attacks on industrial control systems. However, cybersecurity risk assessment process is susceptible to subjective and objective effects. To solve this problem, this paper introduced cybersecurity risk assessment method based on fuzzy theory of Attack-Defense Tree model and probability cybersecurity risk assessment technology, and applied it to airport automatic fuel supply control system. Firstly, an Attack-Defense Tree model was established based on the potential cybersecurity threat of the system and deployed security equipment. Secondly, the interval probability of the attack path was calculated using the triangular fuzzy quantification of the interval probabilities of the attack leaf nodes and defensive leaf nodes. Next, the interval probability of the final path was defuzzified. Finally, the occurrence probability of each final attack path was obtained and a reference for the deployment of security equipment was provided. The main contributions of this paper are as follows: (1) considering the distribution of equipment in industrial control system, a new cybersecurity risk evaluation model of industrial control system is proposed. (2) The experimental results of this article are compared with other assessment technologies, and the trend is similar to that of other evaluation methods, which proves that the method was introduced in this paper is scientific. However, this method reduces the subjective impact of experts on cybersecurity risk assessment, and the assessment results are more objective and reasonable. (3) Applying this model to the airport oil supply automatic control system can comprehensively evaluate risk, solve the practical problems faced by the airport, and also provide an important basis for the cybersecurity protection scheme of the energy industry.

Publisher

IOS Press

Subject

Artificial Intelligence,General Engineering,Statistics and Probability

Reference34 articles.

1. Research progress on information security of industrial control systems [J];Yong;Journal of Tsinghua University (Science and Technology),2012

2. Abe S. , Fujimoto M. , Horata S. , Uchida Y. and Mitsunaga T. , Security threats of Internet-reachable ICS, 2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), Tsukuba, 2016, pp. 750–755.

3. Common Reference Architecture and Standard System Fusion of Two Industries [J];Jian;Computer Integrated Manufacturing System,2019

4. The State Council printed and issued, Made in China 2025 [J], Automation of Electric Power Systems 39(12) (2015), 61.

5. Vulnerability analysis of industrial control systems based on attack graphs [J];Mengzhou;Journal of Zhejiang University (Engineering Science),2014

Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Enhancing power communication network security: A comprehensive cyber risk visual analytics framework with real-time risk assessment;Sustainable Energy, Grids and Networks;2024-06

2. Network Security Risk Evaluation and Inducement Analysis Based on Bayesian Method;2024 5th Information Communication Technologies Conference (ICTC);2024-05-10

3. Aviation Cybersecurity;Advances in Mechatronics and Mechanical Engineering;2024-03-04

4. Fuzzy quantitative attack tree analysis;Lecture Notes in Computer Science;2024

5. Cybersecurity Maturity Model to Prevent Cyberattacks on Web Applications Based on ISO 27032 and NIST;2023 IEEE XXX International Conference on Electronics, Electrical Engineering and Computing (INTERCON);2023-11-02

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3