Cyber Security Risk Assessment for Industrial Automation Platform

被引:10
|
作者
Zheng, Yiling [1 ]
Zheng, Song [2 ]
机构
[1] Fuzhou Univ, Coll Elect Engn & Automat, Fuzhou 350002, Peoples R China
[2] Fuzhou Univ, Coll Elect Engn & Automat, Fujian Prov Enterprise Key Lab Ind Control Cyber, Fuzhou 350002, Peoples R China
关键词
risk assessment; cyber security; Industrial Automation Platform; communication links;
D O I
10.1109/IIH-MSP.2015.58
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the fact that the cyber security risks exist in industrial control system, risk assessment on Industrial Automation Platform (IAP) is discussed in this paper. The cyber security assessment model for IAP is built based on relevant standards at abroad. Fuzzy analytic hierarchy process and fuzzy comprehensive evaluation method based on entropy theory are utilized to evaluate the communication links' risk of IAP software. As a result, the risk weight of communication links which have impacts on platform and the risk level of this platform are given for further study on protective strategy. The assessment result shows that the methods used can evaluate this platform efficiently and practically.
引用
收藏
页码:341 / 344
页数:4
相关论文
共 50 条
  • [11] Cyber Security Risk Assessment of a DDoS Attack
    Wangen, Gaute
    Shalaginov, Andrii
    Hallstensen, Christoffer
    INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 183 - 202
  • [12] Cyber security risk assessment in autonomous shipping
    Tusher, Hasan Mahbub
    Munim, Ziaul Haque
    Notteboom, Theo E.
    Kim, Tae-Eun
    Nazir, Salman
    MARITIME ECONOMICS & LOGISTICS, 2022, 24 (02) : 208 - 227
  • [13] A Model-Data Integrated Cyber Security Risk Assessment Method for Industrial Control Systems
    Peng, Yuan
    Huang, Kaixing
    Tu, Weixun
    Zhou, Chunjie
    PROCEEDINGS OF 2018 IEEE 7TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE (DDCLS), 2018, : 344 - 349
  • [14] Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation
    AlSadhan, Tina
    Park, Joon S.
    2016 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2016, : 164 - 167
  • [15] CYBER SECURITY: THREAT IDENTIFICATION, RISK AND VULNERABILITY ASSESSMENT
    Umberger, Harold
    Gheorghe, Adrian
    ENERGY SECURITY: INTERNATIONAL AND LOCAL ISSUES, THEORETICAL PERSPECTIVES, AND CRITICAL ENERGY INFRASTRUCTURES, 2008, : 247 - 269
  • [16] Cyber security risk assessment for SCADA and DCS networks
    Ralston, P. A. S.
    Graham, J. H.
    Hieb, J. L.
    ISA TRANSACTIONS, 2007, 46 (04) : 583 - 594
  • [17] Cyber security risk assessment method for SCADA system
    Hossain, Nazmul
    Das, Taposh
    Islam, Tariqul
    Alam Hossain, Md
    INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 499 - 510
  • [18] Cyber Security Risk Modelling and Assessment: A Quantitative Approach
    Sokri, Abderrahmane
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 466 - 474
  • [19] A Thermodynamic Assessment of the Cyber Security Risk in Healthcare Facilities
    Fernandes, Filipe
    Alves, Victor
    Machado, Joana
    Miranda, Filipe
    Vicente, Dinis
    Ribeiro, Jorge
    Vicente, Henrique
    Neves, Jose
    TRENDS AND INNOVATIONS IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, 2020, 1161 : 452 - 465
  • [20] Threat Analysis and Risk Assessment in Automotive Cyber Security
    Ward, David
    Ibarra, Ireri
    Ruddle, Alastair
    SAE INTERNATIONAL JOURNAL OF PASSENGER CARS-ELECTRONIC AND ELECTRICAL SYSTEMS, 2013, 6 (02): : 507 - 513