Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks

被引:15
|
作者
Wang, Wei [1 ]
Di Maio, Francesco [1 ]
Zio, Enrico [1 ,2 ,3 ]
机构
[1] Politecn Milan, Dept Energy, Via La Masa 34, I-20156 Milan, Italy
[2] PSL Univ Paris, MINES ParisTech, Ctr Rech Risques & Crises CRC, Sophia Antipolis, France
[3] Kyung Hee Univ, Dept Nucl Engn, Seoul, South Korea
关键词
Adversarial risk analysis (ARA); cyber-physical system; cyber security; defend-attack model; defense strategy; game theory; nuclear power plant; optimization; PARALLEL SYSTEMS; GAME-THEORY; SECURITY; SAFETY; FRAMEWORK; STRATEGY; VULNERABILITY; EQUILIBRIUM; INFORMATION; DECEPTION;
D O I
10.1111/risa.13382
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
Defenders have to enforce defense strategies by taking decisions on allocation of resources to protect the integrity and survivability of cyber-physical systems (CPSs) from intentional and malicious cyber attacks. In this work, we propose an adversarial risk analysis approach to provide a novel one-sided prescriptive support strategy for the defender to optimize the defensive resource allocation, based on a subjective expected utility model, in which the decisions of the adversaries are uncertain. This increases confidence in cyber security through robustness of CPS protection actions against uncertain malicious threats compared with prescriptions provided by a classical defend-attack game-theoretical approach. We present the approach and the results of its application to a nuclear CPS, specifically the digital instrumentation and control system of the advanced lead-cooled fast reactor European demonstrator.
引用
收藏
页码:2766 / 2785
页数:20
相关论文
共 50 条
  • [41] Optimal Intermittent Deception Attacks With Energy Constraints for Cyber-Physical Systems
    Liu, Xuan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (10): : 5889 - 5900
  • [42] Security Control of Cyber-Physical Systems under Cyber Attacks: A Survey
    Xing, Wei
    Shen, Jun
    SENSORS, 2024, 24 (12)
  • [43] Dependable and Optimal Cyber-Physical Systems
    Larsen, Kim Guldstrand
    SOFSEM 2017: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2017, 10139 : 3 - 10
  • [44] Vulnerability Assessment of Electrical Cyber-Physical Systems against Cyber Attacks
    Wang, Yinan
    Yan, Gangfeng
    Zheng, Ronghao
    APPLIED SCIENCES-BASEL, 2018, 8 (05):
  • [45] Secure framework against cyber attacks on cyber-physical robotic systems
    Bhardwaj, Akashdeep
    Alshehri, Mohammad Dahman
    Kaushik, Keshav
    Alyamani, Hasan J.
    Kumar, Manoj
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (06)
  • [46] Modeling and Simulation of Attacks on Cyber-physical Systems
    Bernardeschi, Cinzia
    Domenici, Andrea
    Palmieri, Maurizio
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 700 - 708
  • [47] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [48] Cyber-physical attacks on power distribution systems
    Ayad, Abdelrahman
    Farag, Hany
    Youssef, Amr
    El-Saadany, Ehab
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (02) : 218 - 225
  • [49] A Survey of Network Attacks on Cyber-Physical Systems
    Cao, Liwei
    Jiang, Xiaoning
    Zhao, Yumei
    Wang, Shouguang
    You, Dan
    Xu, Xianli
    IEEE ACCESS, 2020, 8 : 44219 - 44227
  • [50] Covert Attacks in Cyber-Physical Control Systems
    de Sa, Alan Oliveira
    Rust da Costa Carmo, Luiz F.
    Machado, Raphael C. S.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) : 1641 - 1651