Risk assessment method of power plant industrial control information security based on Bayesian attack graph Systems

被引:0
|
作者
Xie, Jianbo [1 ]
Sun, Keda [1 ]
Lei, Xubing [1 ]
机构
[1] Zhejiang Prov Energy Grp Co Ltd, Hangzhou 310007, Peoples R China
关键词
Bayesian attack graph; industrial control information of power plant; security risk; risk assessment; GENERATION; MODEL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In view of the current fault isolation and single-fault assessment methods for power plant industrial control information security, there are problems of low attack point capture accuracy, long time, and poor evaluation effect. A Bayesian attack graph-based intelligent risk assessment of power plant industrial control information security is proposed. method. The attack graph technology is used to model the risk elements identified in the risk analysis, and the probabilistic model and Bayesian probabilistic attack graph are used to describe the relationship between system threats and attack behaviors. Deeply understand the basic elements of attack graph modeling for information collection, automatically generate tools to construct and optimize attack graphs, use sample information to modify the original estimates of parameters, and the hyperparameters of the prior distribution are determined by the node probability value. Analyze the attack sample data to obtain the attribute data of the node, so as to complete the posterior estimation parameter learning. The basic credibility of each proposition in the recognition framework is determined, and the weight vector of evidence is determined. Analyze the specific information security threats of the industrial control system of the power plant, obtain the basic credibility function, and establish the risk calculation formula. Quantify the language assessment of security threats by experts, construct an intelligent risk assessment model for power plant industrial control information security, and design the implementation process of risk assessment based on the risk analysis of attack graphs. The weight value of security threats and the result of credibility distribution are determined to complete the intelligent assessment. It can be seen from the experimental results that the short-term energy of this method is gradually invalid, the information is in the storage stage, and no new evaluation information will be added. The highest accuracy of capturing attack points under passive and active attacks is 91% and 93%, respectively, and the longest capturing of attack points. The time does not exceed 20 min.
引用
收藏
页码:529 / 541
页数:13
相关论文
共 50 条
  • [41] Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game
    Liu, Xiaoxue
    Zhang, Jiexin
    Zhu, Peidong
    Tan, Qingping
    Yin, Wei
    [J]. COMPUTERS & SECURITY, 2021, 102
  • [42] An approach to evaluate network security risk based on attack graph
    Hu, Xiaoyun
    Yu, Yang
    Xia, Chunhe
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
  • [43] A HOST-BASED SECURITY ASSESSMENT ARCHITECTURE FOR INDUSTRIAL CONTROL SYSTEMS
    Rakshit, Abhishek
    Ou, Xinming
    [J]. 2009 2ND INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS 2009), 2009, : 7 - 12
  • [44] A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems
    Kawanishi, Yasuyuki
    Nishihara, Hideaki
    Souma, Daisuke
    Yoshida, Hirotaka
    Hata, Yoichi
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 62 - 69
  • [45] Automating Safety and Security Risk Assessment in Industrial Control Systems: Challenges and Constraints
    Bhosale, Pushparaj
    Kastner, Wolfgang
    Sauter, Thilo
    [J]. 2022 IEEE 27TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2022,
  • [46] DECISION SUPPORT BASED ON THE RISK ASSESSMENT OF INFORMATION SYSTEMS AND BAYESIAN LEARNING
    Ocevcic, Hrvoje
    Nenadic, Kresimir
    Solic, Kresimir
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2014, 21 (03): : 539 - 544
  • [47] Decision support based on the risk assessment of information systems and bayesian learning
    Metodologija odlučivanja temeljena na procjeni rizika informacijskih sustava i bayesovom učenju
    [J]. 1600, Strojarski Facultet (21):
  • [48] Cyber Attack Scenario Generation Method for Improving the Efficient of Security Measures in Industrial Control Systems
    Ogura T.
    Fujita J.
    Matsumoto N.
    [J]. IEEJ Transactions on Electronics, Information and Systems, 2024, 144 (01) : 35 - 42
  • [49] A Quantitative Method for Evaluating Network Security Based on Attack Graph
    Zheng, Yukun
    Lv, Kun
    Hu, Changzhen
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
  • [50] Cyber Risk Assessment of Power Control Systems - A Metrics weighed by Attack Experiments
    Dondossola, G.
    Garrone, F.
    Szanto, J.
    [J]. 2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2011,