A novel intelligent assessment method for SCADA information security risk based on causality analysis

被引:1
|
作者
Li Yang
Xiedong Cao
Xinyu Geng
机构
[1] Southwest Petroleum University,School of Computer Science
[2] Southwest Petroleum University,School of Electrical Engineering and Information
来源
Cluster Computing | 2019年 / 22卷
关键词
Oil and gas SCADA system; Decision tree; Factor space; Fuzzy reasoning; Causality Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
At present, the oil and gas SCADA system is facing severe information security threats, and the information security assessment for the existing SCADA system is an important response measure. In order to solve the problem that the standard of information security assessment of industrial control system are not perfect and the evaluation objects are fuzzy, this study put forward a novel method of oil and gas SCADA security assessment based on causality analysis. Firstly, defense security assessment technology route with pre-defense,post-defense was introduced and the evaluation indexes were mapped to the pre-defense and post-defense factors, and the pre-defense and post-defense scoring tables for oil and gas SCADA system information security were developed, the evaluation factors were formed as causality diagram table; then the factor space theory was used to evaluate and model the information security of oil and gas SCADA system, and the model was formally described. Finally causality analysis evaluation method of fuzzy Mamdani reasoning was adopted to evaluate factors neurons in the proposed model. The results show that the average accuracy of the causality analysis and the decision tree algorithm is 92.06 and 91.45% respectively. The causality analysis method based on factor space has a good effect on SCADA information security assessment. The conclusions of this study can not only be applied to oil and gas SCADA security risk assessment, but also provide a reference for other industry security assessment.
引用
收藏
页码:5491 / 5503
页数:12
相关论文
共 50 条
  • [1] A novel intelligent assessment method for SCADA information security risk based on causality analysis
    Yang, Li
    Cao, Xiedong
    Geng, Xinyu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S5491 - S5503
  • [2] An Improved Risk Assessment Method for SCADA Information Security
    Markovic-Petrovic, J. D.
    Stojanovic, M. D.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 69 - 72
  • [3] A Novel Risk Assessment Method Based on Hybrid Algorithm for SCADA
    Chen, Yenan
    Lu, Tinghui
    Li, Linsen
    Zhang, Han
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2022, PT II, 2022, 461 : 3 - 17
  • [4] Gray Relational Analysis based Method for Information Security Risk Assessment
    Zhou, Li
    Zhou, Yanhui
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1086 - 1089
  • [5] Cyber security risk assessment method for SCADA system
    Hossain, Nazmul
    Das, Taposh
    Islam, Tariqul
    Alam Hossain, Md
    INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 499 - 510
  • [6] Risk Assessment Method of Information Security Based on AHP
    Ning, Xu
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 430 - 433
  • [7] The Research of Information Security Risk Assessment Method Based on AHP
    Xu, Ning
    Zhao, DongMei
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 575 - 580
  • [8] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [9] An information security risk assessment method for cloud systems based on risk contagion
    Li, Ziqian
    Tang, Zhenying
    Lv, Jingxian
    Li, Huiqin
    Han, Wei
    Zhang, Zhimin
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 83 - 87
  • [10] Information Security Risk Assessment: A Method Comparison
    Wangen, Gaute
    COMPUTER, 2017, 50 (04) : 52 - 61