Risk assessment method of power plant industrial control information security based on Bayesian attack graph Systems

被引:0
|
作者
Xie, Jianbo [1 ]
Sun, Keda [1 ]
Lei, Xubing [1 ]
机构
[1] Zhejiang Prov Energy Grp Co Ltd, Hangzhou 310007, Peoples R China
关键词
Bayesian attack graph; industrial control information of power plant; security risk; risk assessment; GENERATION; MODEL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In view of the current fault isolation and single-fault assessment methods for power plant industrial control information security, there are problems of low attack point capture accuracy, long time, and poor evaluation effect. A Bayesian attack graph-based intelligent risk assessment of power plant industrial control information security is proposed. method. The attack graph technology is used to model the risk elements identified in the risk analysis, and the probabilistic model and Bayesian probabilistic attack graph are used to describe the relationship between system threats and attack behaviors. Deeply understand the basic elements of attack graph modeling for information collection, automatically generate tools to construct and optimize attack graphs, use sample information to modify the original estimates of parameters, and the hyperparameters of the prior distribution are determined by the node probability value. Analyze the attack sample data to obtain the attribute data of the node, so as to complete the posterior estimation parameter learning. The basic credibility of each proposition in the recognition framework is determined, and the weight vector of evidence is determined. Analyze the specific information security threats of the industrial control system of the power plant, obtain the basic credibility function, and establish the risk calculation formula. Quantify the language assessment of security threats by experts, construct an intelligent risk assessment model for power plant industrial control information security, and design the implementation process of risk assessment based on the risk analysis of attack graphs. The weight value of security threats and the result of credibility distribution are determined to complete the intelligent assessment. It can be seen from the experimental results that the short-term energy of this method is gradually invalid, the information is in the storage stage, and no new evaluation information will be added. The highest accuracy of capturing attack points under passive and active attacks is 91% and 93%, respectively, and the longest capturing of attack points. The time does not exceed 20 min.
引用
收藏
页码:529 / 541
页数:13
相关论文
共 50 条
  • [1] A Bayesian-Attack-Graph-Based Security Assessment Method for Power Systems
    Chen, Lu
    Zhang, Tao
    Ma, Yuanyuan
    Li, Yong
    Wang, Chen
    He, Chuan
    Lv, Zhuo
    Li, Nuannuan
    [J]. ELECTRONICS, 2024, 13 (13)
  • [2] A Dynamic Risk Assessment Method Based on Bayesian Attack Graph
    Luo, Zhiyong
    Xu, Rui
    Wang, Jianming
    Zhu, Weicheng
    [J]. International Journal of Network Security, 2022, 24 (05) : 787 - 796
  • [3] Attack Graph-Based Quantitative Assessment for Industrial Control System Security
    Zhang, Yaofang
    Wang, Bailing
    Wu, Chenrui
    Wei, Xiaojie
    Wang, Zibo
    Yin, Guohua
    [J]. 2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 1748 - 1753
  • [4] An approach of security risk evaluation based on the Bayesian attack graph
    Hui, Wang
    Fuwang, Chen
    Yunfeng, Wang
    [J]. Open Cybernetics and Systemics Journal, 2015, 9 (01): : 953 - 960
  • [5] Multiobjective network security dynamic assessment method based on Bayesian network attack graph
    Xie, Jialiang
    Zhang, Shanli
    Wang, Honghui
    Chen, Mingzhi
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2024, 17 (01) : 38 - 60
  • [6] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [7] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
  • [8] Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM
    Liu, Nian
    Zhang, Jianhua
    Zhang, Hao
    Liu, Wenxia
    [J]. IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (03) : 1492 - 1500
  • [9] Research on risk assessment technology of industrial control system based on attack graph
    Zou, Zhenwan
    Wang, Di
    Yang, Huiting
    Hou, Yingsa
    Yang, Yandong
    Xu, Wenlu
    [J]. PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 2420 - 2423
  • [10] Host security assessment method based on attack graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99