A novel intelligent assessment method for SCADA information security risk based on causality analysis

被引:1
|
作者
Li Yang
Xiedong Cao
Xinyu Geng
机构
[1] Southwest Petroleum University,School of Computer Science
[2] Southwest Petroleum University,School of Electrical Engineering and Information
来源
Cluster Computing | 2019年 / 22卷
关键词
Oil and gas SCADA system; Decision tree; Factor space; Fuzzy reasoning; Causality Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
At present, the oil and gas SCADA system is facing severe information security threats, and the information security assessment for the existing SCADA system is an important response measure. In order to solve the problem that the standard of information security assessment of industrial control system are not perfect and the evaluation objects are fuzzy, this study put forward a novel method of oil and gas SCADA security assessment based on causality analysis. Firstly, defense security assessment technology route with pre-defense,post-defense was introduced and the evaluation indexes were mapped to the pre-defense and post-defense factors, and the pre-defense and post-defense scoring tables for oil and gas SCADA system information security were developed, the evaluation factors were formed as causality diagram table; then the factor space theory was used to evaluate and model the information security of oil and gas SCADA system, and the model was formally described. Finally causality analysis evaluation method of fuzzy Mamdani reasoning was adopted to evaluate factors neurons in the proposed model. The results show that the average accuracy of the causality analysis and the decision tree algorithm is 92.06 and 91.45% respectively. The causality analysis method based on factor space has a good effect on SCADA information security assessment. The conclusions of this study can not only be applied to oil and gas SCADA security risk assessment, but also provide a reference for other industry security assessment.
引用
收藏
页码:5491 / 5503
页数:12
相关论文
共 50 条
  • [21] Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence
    Huang Xuepeng
    Xu Wei
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (03) : 188 - 196
  • [22] Assessment Model and Method Research of Information Security Risk
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2170 - +
  • [23] Information security risk assessment using the AHP method
    Zaburko, J.
    Szulzyk-Cieplak, J.
    IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
  • [24] Cyber security risk assessment for SCADA and DCS networks
    Ralston, P. A. S.
    Graham, J. H.
    Hieb, J. L.
    ISA TRANSACTIONS, 2007, 46 (04) : 583 - 594
  • [25] A new information security risk analysis method based on membership degree
    Chen, Jiqang
    Pedrycz, Witold
    Ma, Litao
    Wang, Chao
    KYBERNETES, 2014, 43 (05) : 686 - 698
  • [26] ISRAM: information security risk analysis method
    Karabacak, B
    Sogukpinar, I
    COMPUTERS & SECURITY, 2005, 24 (02) : 147 - 159
  • [27] Information Security Risk Analysis of Intelligent Terminals in Electricity Information Collection System
    Li Tong
    Sun Heyang
    Yang Chao
    Ren Shuai
    Wang Gang
    Song Jinliang
    Jiang Xue
    PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 98 - 103
  • [28] Information asset valuation method for information technology security risk assessment
    Foroughi, Farhad
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 576 - 581
  • [29] Risk Assessment of Power Information Risk Security Based on Risk Matrix
    Wang Xu
    Chen Tao
    Wang Yujie
    Guo Qinrui
    Teng Yangxin
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 1494 - 1498
  • [30] A Value based Security Risk Assessment Method
    Shi, Yijie
    Wen, Qiaoyan
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 49 - 51