A novel intelligent assessment method for SCADA information security risk based on causality analysis

被引:1
|
作者
Li Yang
Xiedong Cao
Xinyu Geng
机构
[1] Southwest Petroleum University,School of Computer Science
[2] Southwest Petroleum University,School of Electrical Engineering and Information
来源
Cluster Computing | 2019年 / 22卷
关键词
Oil and gas SCADA system; Decision tree; Factor space; Fuzzy reasoning; Causality Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
At present, the oil and gas SCADA system is facing severe information security threats, and the information security assessment for the existing SCADA system is an important response measure. In order to solve the problem that the standard of information security assessment of industrial control system are not perfect and the evaluation objects are fuzzy, this study put forward a novel method of oil and gas SCADA security assessment based on causality analysis. Firstly, defense security assessment technology route with pre-defense,post-defense was introduced and the evaluation indexes were mapped to the pre-defense and post-defense factors, and the pre-defense and post-defense scoring tables for oil and gas SCADA system information security were developed, the evaluation factors were formed as causality diagram table; then the factor space theory was used to evaluate and model the information security of oil and gas SCADA system, and the model was formally described. Finally causality analysis evaluation method of fuzzy Mamdani reasoning was adopted to evaluate factors neurons in the proposed model. The results show that the average accuracy of the causality analysis and the decision tree algorithm is 92.06 and 91.45% respectively. The causality analysis method based on factor space has a good effect on SCADA information security assessment. The conclusions of this study can not only be applied to oil and gas SCADA security risk assessment, but also provide a reference for other industry security assessment.
引用
收藏
页码:5491 / 5503
页数:12
相关论文
共 50 条
  • [31] An Information Security Risk Assessment System Based on Knowledge
    Ma, Jianqiang
    2017 4TH ICMIBI INTERNATIONAL CONFERENCE ON TRAINING, EDUCATION, AND MANAGEMENT (ICMIBI-TEM 2017), 2017, 83 : 376 - 381
  • [32] Information Security Risk Assessment and Management Method in Computer Networks
    Anikin, Igor V.
    2015 INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS (SIBCON), 2015,
  • [33] A review of cyber security risk assessment methods for SCADA systems
    Cherdantseva, Yulia
    Burnap, Pete
    Blyth, Andrew
    Eden, Peter
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    COMPUTERS & SECURITY, 2016, 56 : 1 - 27
  • [34] A Fuzzy AHP Approach for Security Risk Assessment in SCADA Networks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    Rakas, Slavica V. Bostjancic
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2019, 19 (03) : 69 - 74
  • [35] A Business Aware Information Security Risk Analysis Method
    Sadok, M.
    Spagnoletti, P.
    INFORMATION TECHNOLOGY AND INNOVATION TRENDS IN ORGANIZATIONS, 2011, : 453 - 460
  • [36] Intelligent Data Analysis in Information Security
    Grusho, A. A.
    Grusho, N. A.
    Zabezhailo, M. I.
    Timonina, E. E.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) : 722 - 725
  • [37] THE NEW PROCESSED DATA BASED METHOD OF INFORMATION SECURITY FOR INTELLIGENT EQUIPMENT
    Zhang Jiemin
    Zhang Zidong
    CONTROL AND INTELLIGENT SYSTEMS, 2015, 43 (02) : 118 - 124
  • [38] The information security transmission method for intelligent examination based on ZigBee communication
    Xie H.
    Yang B.
    Ren Z.
    Mu K.
    Zhao X.
    Li B.
    International Journal of Information and Communication Technology, 2021, 19 (03) : 258 - 274
  • [39] Security Investment Portfolio Risk Assessment Based on VAR Method and Empirical Analysis
    Zhang Guoliang
    Zhang Bo
    LEMLID: 2008 NORTHEAST ASIA LOGISTICS ENGINEERING AND MODERN LOGISTICS INDUSTRY DEVELOPMENT, PROCEEDINGS, 2008, : 192 - 197
  • [40] Development of a Failure Mode and Effects Analysis Based Risk Assessment Tool for Information Security
    Lai, Lotto Kim Hung
    Chin, Kwai Sang
    INDUSTRIAL ENGINEERING AND MANAGEMENT SYSTEMS, 2014, 13 (01): : 87 - 100