Construction of information network vulnerability threat assessment model for CPS risk assessment

被引:7
|
作者
Xiong, Juxia [1 ,2 ,3 ]
Wu, Jinzhao [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Chengdu Inst Comp Applicat, Chengdu 610041, Sichuan, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
[3] Guangxi Univ Nationalities, Guangxi Key Lab Hybrid Computat & IC Design Anal, Nanning 53006, Guangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
CPS; Risk assessment; Information network; Vulnerability threat assessment model; SECURITY RISK; INTERNET;
D O I
10.1016/j.comcom.2020.03.026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber physical systems (CPS) has been hailed as the next future of computing by integrating information technology into physical systems to increase their capabilities. Information network is an organic part of CPS, and vulnerability threat assessment of information network is one of the important bases of CPS risk assessment. In view of the limitation of general information network vulnerability threat assessment technology, this paper proposes an information network vulnerability threat assessment model based on dynamic attack and defence game. Firstly, a risk assessment model suitable for CPS is constructed based on the actual control scheduling of information system. At the same time, considering the constraint conditions of both sides, including the quantity of available resources, rational allocation of resources, cost-effectiveness and the number of attacked nodes, a more perfect information network vulnerability threat assessment model is established. Then, on this basis, the dynamic attack and defence game function and game solution steps are designed to realize the quantitative assessment of information network vulnerability threat of CPS risk assessment. Finally, a simulation test based on IEEE 34-node information network system is carried out to verify the effectiveness of the proposed method.
引用
收藏
页码:197 / 204
页数:8
相关论文
共 50 条
  • [21] A Novel Information Fusion Model for Assessment of Malware Threat
    Dai, Chao
    Pang, Jianmin
    Zhang, Xiaochuan
    Liang, Guanghui
    Bai, Hong
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 1 - 15
  • [22] The Vulnerability Relationship Prediction Research for Network Risk Assessment
    Jiao, Jian
    Li, Wenhao
    Guo, Dongchao
    [J]. ELECTRONICS, 2024, 13 (17)
  • [23] Construction Project Risk Assessment Model
    Zhang Su-xian
    Li Xiao-li
    [J]. PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON ENGINEERING AND RISK MANAGEMENT, 2011, : 42 - 45
  • [24] Safety Risk Assessment of Power Construction Project Based on the Vulnerability
    Yang, Taihua
    Zheng, Qinghua
    Wang, Yang
    Liu, Rui
    [J]. 2ND INTERNATIONAL CONFERENCE ON NEW ENERGY AND RENEWABLE RESOURCES (ICNERR 2017), 2017, : 108 - 112
  • [25] RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network
    Sha, Hongzhou
    Li, Xiaoqian
    Liu, Qingyun
    Zhou, Zhou
    Zhang, Liang
    Wang, Lidong
    [J]. TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 295 - 303
  • [26] Access Graph Based Risk Assessment Model for Network Information System
    Xiao, Xiaochun
    Wang, Huan
    Zhang, Gendu
    [J]. FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 42 - 48
  • [27] Security Vulnerability Analysis Assessment Method of Power Information Network
    Zhao, Yong-bin
    Zhang, Tao
    Zhang, Bo
    Hou, Jun
    [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 372 - 380
  • [28] Effective Network Vulnerability Assessment through Model Abstraction
    Zhang, Su
    Ou, Xinming
    Homer, John
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2011, 6739 : 17 - +
  • [29] Semi-Automated Threat, Vulnerability & Risk Assessment (TVRA) for Medical Devices
    Moukafih, Nabil
    Zhang, Hongsen
    Epiphaniou, Gregory
    Maple, Carsten
    Taylor, Steve
    Carmichael, Laura
    [J]. 17TH ACM INTERNATIONAL CONFERENCE ON PERVASIVE TECHNOLOGIES RELATED TO ASSISTIVE ENVIRONMENTS, PETRA 2024, 2024, : 687 - 693
  • [30] Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
    Galar, Zbigniew
    Sadowski, Adam
    [J]. DEFENCE AND SECURITY ANALYSIS, 2023, 39 (01): : 111 - 117