Multidimensional attack damage assessment of cyber-physical systems based on hierarchical analysis

被引:0
|
作者
机构
关键词
analytic hierarchy process; attack damage assessment attributes; cyber-physical systems; multidimensional attack damage assessment; network attacks;
D O I
10.13700/j.bh.1001-5965.2022.0137
中图分类号
学科分类号
摘要
With characteristics, such as cross interconnection and multiple connections, cyber-physical systems is susceptible to network attack. Through relevant research on its network architecture and on the characteristics of its network application, a model for multidimensional attack damage assessment is established. Firstly, the cyber-physical systems was divided in three dimensions: the physical layer, the rule layer and the service layer. For each layer, an attribute-based method for assessing the network attack damage was given. Then, through monitoring the network status, the attributes for attack damage assessment were obtained, which include topological stability, connectivity availability, failure controllability, transmission stability, packet loss availability, bit error controllability, response stability, service availability and risk controllability. Finally, the analytic hierarchy process was used to gain the evaluation results of the attack damage in each of the three different layers and the whole network, thus providing support and basis for the security protection of the network. Simulation of the DDoS attack on the cyber-physical systems, along with the application of the proposed method to evaluate the attack damage, verifies the practicability and effectiveness of the model. © 2022 Beijing University of Aeronautics and Astronautics (BUAA). All rights reserved.
引用
收藏
页码:1827 / 1835
页数:8
相关论文
共 23 条
  • [1] ALLADI T, CHAMOLA V, ZEADALLY S., Industrial control systems:Cyberattack trends and counter-measures[J], Computer Communications, 155, pp. 1-8, (2020)
  • [2] GUO Q L, XIN S J, WANG J H, Et al., Comprehensive security assessment for a cyber physical energy system: A lesson from Ukraine’ s blackout[ J], Automation of Electric Power Systems, 40, 5, pp. 145-147, (2016)
  • [3] WANG D., Analyze the attack method of ransomware Cerber [ J], Computer and Network, 15, pp. 52-53, (2016)
  • [4] SHI Z Y, ZHAO G L, LIU J H., The effect evaluation of the network attack based on the fuzzy comprehensive evaluation method[C], 2016 3rd International Conference on Systems and Informatics (ICSAI), pp. 367-372, (2016)
  • [5] LIN J, JIANG R, QI Y L, Et al., Construction of index system based on advanced persistent threat[ C], ITM Web of Conferences, 12, (2017)
  • [6] XIAN M, BAO W D, WANG Y J., Introduction to effect evaluation of network attack [ M ], (2007)
  • [7] WANG S, SUN L C., Research and implementation of evaluation system for network attack effect based on indicator system[ J], Computer Engineering and Applications, 41, 34, pp. 149-153, (2005)
  • [8] ZHAO B F, YIN X C., Research on multidimensional attack effect evaluation method [ J], Computer Engineering and Design, 32, 8, pp. 2596-2599, (2011)
  • [9] HU Y, ZHENG K F, YANG Y X., A metric system to evaluate network attack effects based on atomic functions[ J], Computer Engineering & Science, 30, 10, pp. 1-4, (2008)
  • [10] NIU Z, MA T, MA C L, Et al., Analysis of the evaluation index for jamming partition battlefield wireless network [ C], 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, pp. 2438-2442, (2019)