Security risk assessment of projects in high-risk areas based on attack-defense game model

被引:0
|
作者
Yao, Yifan [1 ]
Chen, Wenjing [1 ]
机构
[1] Peoples Publ Secur Univ China, Acad Informat & Network Secur, Beijing 100038, Peoples R China
关键词
D O I
10.1038/s41598-023-40409-w
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Assessing the security risk of projects in high-risk areas is particularly important. This paper develops a security risk assessment model for projects in high-risk areas based on the target loss probability model and Bayesian game model. This model is modeled from the perspective of attack-defense confrontation and addresses the issue that traditional risk assessment focuses on the analysis of the attacker yet neglects to analyze the defender-the defender's optimum defensive information is not quantitatively determined. The risk level, optimum defensive resource value, and optimum defensive strategy of the project are determined through the analysis of a project in the high-risk area. This enables the project's risk manager to adjust the defensive resources reasonably and optimally, confirming the objectivity and feasibility of the model and offering a new benchmark for security risk assessment, which has significant practical implications.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] CLOSURE: A cloud scientific workflow scheduling algorithm based on attack-defense game model
    Wang, Yawen
    Guo, Yunfei
    Guo, Zehua
    Baker, Thar
    Liu, Wenyan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 460 - 474
  • [22] Attack-Defense Trees based Cyber Security Analysis for CPSs
    Ji, Xiang
    Yu, HuiQun
    Fan, GuiSheng
    Fu, WenHao
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 693 - 698
  • [23] An attack-defense game model in infrastructure networks under link hiding
    Qi, Gaoxin
    Li, Jichao
    Xu, Xueming
    Chen, Gang
    Yang, Kewei
    CHAOS, 2022, 32 (11)
  • [24] Research on Risk Assessment and Strategy Dynamic Attack and Defense Game Based on Twin Model of Power Distribution Network
    Cai, Wenqi
    Yu, Liying
    Yang, Dongsheng
    Zheng, Yan
    2017 IEEE 7TH ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (CYBER), 2017, : 684 - 689
  • [25] Nash equilibrium strategy and attack-defense game model for naval support base
    Zeng, Bin
    Wang, Rui
    Li, Houpu
    Zhang, Hongqiang
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (08): : 2570 - 2580
  • [26] Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model
    Tan, Jing-lei
    Zhang, Heng-wei
    Zhang, Hong-qi
    Lei, Cheng
    Jin, Hui
    Li, Bo-wen
    Hu, Hao
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [27] Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets
    Wang, Yuanzhuo
    Li, Jingyuan
    Meng, Kun
    Lin, Chuang
    Cheng, Xueqi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 89 - 99
  • [28] An attack-defense game based reliability analysis approach for wireless sensor networks
    Jiang, Wen
    Ma, Zeyu
    Deng, Xinyang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [29] NETWORKS ATTACK-DEFENSE MODEL BASED ON THE IMPROVED LANCHESTER EQUATION
    Liu, Jin-Xing
    Zhao, Dong-Mei
    Wang, Fang
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1083 - 1086
  • [30] Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes
    Wang, Shuliang
    Sun, Jingya
    Zhang, Jianhua
    Dong, Qiqi
    Gu, Xifeng
    Chen, Chen
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2023, 40