Security risk assessment of projects in high-risk areas based on attack-defense game model

被引:0
|
作者
Yao, Yifan [1 ]
Chen, Wenjing [1 ]
机构
[1] Peoples Publ Secur Univ China, Acad Informat & Network Secur, Beijing 100038, Peoples R China
关键词
D O I
10.1038/s41598-023-40409-w
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Assessing the security risk of projects in high-risk areas is particularly important. This paper develops a security risk assessment model for projects in high-risk areas based on the target loss probability model and Bayesian game model. This model is modeled from the perspective of attack-defense confrontation and addresses the issue that traditional risk assessment focuses on the analysis of the attacker yet neglects to analyze the defender-the defender's optimum defensive information is not quantitatively determined. The risk level, optimum defensive resource value, and optimum defensive strategy of the project are determined through the analysis of a project in the high-risk area. This enables the project's risk manager to adjust the defensive resources reasonably and optimally, confirming the objectivity and feasibility of the model and offering a new benchmark for security risk assessment, which has significant practical implications.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Security risk assessment of projects in high-risk areas based on attack-defense game model
    Yifan Yao
    Wenjing Chen
    Scientific Reports, 13
  • [2] Attack-Defense Utility Quantification And Security Risk Assessment
    Yang, Su
    Wu, Chensi
    Xie, Weiqiang
    Wang, Wenjie
    Zhang, Yuqing
    2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 1456 - 1461
  • [3] Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model
    Liu, Jianyi
    Weng, Fangyu
    Zhang, Ru
    Guo, Yunbiao
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 161 - 173
  • [4] Cybersecurity risk assessment method of ICS based on attack-defense tree model
    Wang, Shuang
    Ding, Lei
    Sui, He
    Gu, Zhaojun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 40 (06) : 10475 - 10488
  • [5] Threat risk analysis for cloud security based on Attack-Defense Trees
    Wang, Ping
    Lin, Hui-Tang
    Wang, Tzu Chia
    Lin, Wen-Hui
    Kuo, Pu-Tsun
    International Journal of Advancements in Computing Technology, 2012, 4 (17) : 607 - 617
  • [6] Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
    Zhao, Xuhua
    International Journal of Network Security, 2020, 22 (06) : 1037 - 1042
  • [7] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [8] Tree-Based Attack-Defense Model for Risk Assessment in Multi-UAV Networks
    Garg, Sahil
    Aujla, Gagangeet Singh
    Kumar, Neeraj
    Batra, Shalini
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (06) : 35 - 41
  • [9] A Simplified Attack-Defense Game Model for NSSA
    Sun, Xueyan
    Liu, Xiaowu
    Zhang, Shuwen
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 820 - 828
  • [10] Cyber-Physical Coordinated Risk Mitigation in Smart Grids Based on Attack-Defense Game
    Zhang, Zhimei
    Huang, Shaowei
    Chen, Ying
    Li, Boda
    Mei, Shengwei
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2022, 37 (01) : 530 - 542