Construction of information network vulnerability threat assessment model for CPS risk assessment

被引:7
|
作者
Xiong, Juxia [1 ,2 ,3 ]
Wu, Jinzhao [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Chengdu Inst Comp Applicat, Chengdu 610041, Sichuan, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
[3] Guangxi Univ Nationalities, Guangxi Key Lab Hybrid Computat & IC Design Anal, Nanning 53006, Guangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
CPS; Risk assessment; Information network; Vulnerability threat assessment model; SECURITY RISK; INTERNET;
D O I
10.1016/j.comcom.2020.03.026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber physical systems (CPS) has been hailed as the next future of computing by integrating information technology into physical systems to increase their capabilities. Information network is an organic part of CPS, and vulnerability threat assessment of information network is one of the important bases of CPS risk assessment. In view of the limitation of general information network vulnerability threat assessment technology, this paper proposes an information network vulnerability threat assessment model based on dynamic attack and defence game. Firstly, a risk assessment model suitable for CPS is constructed based on the actual control scheduling of information system. At the same time, considering the constraint conditions of both sides, including the quantity of available resources, rational allocation of resources, cost-effectiveness and the number of attacked nodes, a more perfect information network vulnerability threat assessment model is established. Then, on this basis, the dynamic attack and defence game function and game solution steps are designed to realize the quantitative assessment of information network vulnerability threat of CPS risk assessment. Finally, a simulation test based on IEEE 34-node information network system is carried out to verify the effectiveness of the proposed method.
引用
收藏
页码:197 / 204
页数:8
相关论文
共 50 条
  • [1] An Fusion Model for Network Threat Identification and Risk Assessment
    Ma, Jie
    Li, Zhi-tang
    Zhang, Hong-wu
    [J]. 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL I, PROCEEDINGS, 2009, : 314 - +
  • [2] Threat and vulnerability risk assessment for the insurance industry
    Trainor, T
    Caprari, K
    Green, C
    Roth, J
    Unger, C
    [J]. Managing in a Dangerous World: TWENTY-FIVE YEARS OF TECHNICAL CONFERENCES: BRIDGING BETWEEN TECHNOLOGY AND MANAGEMENT, 2004, : 227 - 234
  • [3] Robust Cyber-threat and Vulnerability Information Analyzer for Dynamic Risk Assessment
    Malik, Adeel A.
    Tosh, Deepak K.
    [J]. 2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 168 - 173
  • [4] A Vulnerability Risk Assessment Method Based on Heterogeneous Information Network
    Wang, Wenrui
    Shi, Fan
    Zhang, Min
    Xu, Chengxi
    Zheng, Jinghua
    [J]. IEEE ACCESS, 2020, 8 : 148315 - 148330
  • [5] eTVRA, a threat, vulnerability and risk assessment tool for eEurope
    Rossebo, Judith E. Y.
    Cadzow, Scott
    Sijben, Paul
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2006, 3986 : 467 - 471
  • [6] CYBER SECURITY: THREAT IDENTIFICATION, RISK AND VULNERABILITY ASSESSMENT
    Umberger, Harold
    Gheorghe, Adrian
    [J]. ENERGY SECURITY: INTERNATIONAL AND LOCAL ISSUES, THEORETICAL PERSPECTIVES, AND CRITICAL ENERGY INFRASTRUCTURES, 2008, : 247 - 269
  • [7] TANDI: Threat assessment of network data and information
    Holsopple, Jared
    Yang, Shanchieh Jay
    Sudit, Moises
    [J]. MULTISENSOR, MULTISOURCE INFORMATIN FUSION: ARCHITECTURES, ALGORITHMS, AND APPLICATIONS 2006, 2006, 6242
  • [8] Construction of Information Security Risk Assessment Model in Smart City
    Hui, Pan
    [J]. 2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 393 - 396
  • [9] eTVRA, a threat, vulnerability and risk assessment method and tool for eEurope
    Rossebo, Judith E. Y.
    Cadzow, Scott
    Sijben, Paul
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 925 - +
  • [10] An Information Security Threat Assessment Model based on Bayesian Network and OWA Operator
    Wu, Kehe
    Ye, Shichao
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (02): : 833 - 838