Attack-Defense Trees based Cyber Security Analysis for CPSs

被引:0
|
作者
Ji, Xiang [1 ]
Yu, HuiQun [1 ]
Fan, GuiSheng [1 ]
Fu, WenHao [1 ]
机构
[1] East China Univ Sci & Technol, Dept Comp Sci & Engn, Shanghai 200237, Peoples R China
关键词
CPS; cyber security; threat risk assessment; attack-defense tree;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber-physical system (CPS) is the fuse of cyber world and the dynamic physical world and it is being widely used in areas closely related to people's livelihood. Therefore, the security issues of CPS have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. The existing proposals using attack trees for risk assessment mainly focus on depicting the possible intrusions, not for interactions between threats and defenses. In this paper, a risk assessment idea for cyber-physical system with the use of attack-defense tree (ADTree) is proposed, considering the effect of both the attack cost and defense cost. The effectiveness of the proposed approach is evaluated by a set of metrics like probability of success, attack and defense cost and the impact of an attack. In addition, we introduce two economic factors (ROA and ROI) to evaluate the performance of ADTree. Finally, an illustration case of threat risk analysis in SCADA system is given to demonstrate our approach. Overall, our approach provides an effective means of risk assessment and countermeasures evaluation in the evolutional process of security management for cyber-physical system security.
引用
收藏
页码:693 / 698
页数:6
相关论文
共 50 条
  • [1] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
  • [2] Attack-defense trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    [J]. JOURNAL OF LOGIC AND COMPUTATION, 2014, 24 (01) : 55 - 87
  • [3] Stochastic-based Semantics Of Attack-Defense Trees For Security Assessment
    Lounis, Karim
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2018, 337 : 135 - 154
  • [4] Foundations of Attack-Defense Trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 80 - +
  • [5] Expected Cost Analysis of Attack-Defense Trees
    Eisentraut, Julia
    Kretinsky, Jan
    [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 203 - 221
  • [6] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
  • [7] On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
    Kordy, Barbara
    Widel, Wojciech
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2018, 2018, 10804 : 325 - 346
  • [8] A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
    Jhawar, Ravi
    Lounis, Karim
    Mauw, Sjouke
    [J]. SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 138 - 153
  • [9] Computational Aspects of Attack-Defense Trees
    Kordy, Barbara
    Pouly, Marc
    Schweitzer, Patrick
    [J]. SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 103 - +
  • [10] Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security Requirements
    Broccia, Giovanna
    ter Beek, Maurice H.
    Lafuente, Alberto Lluch
    Spoletini, Paola
    Ferrari, Alessio
    [J]. REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2024, 2024, 14588 : 39 - 56