A novel intelligent assessment method for SCADA information security risk based on causality analysis

被引:1
|
作者
Li Yang
Xiedong Cao
Xinyu Geng
机构
[1] Southwest Petroleum University,School of Computer Science
[2] Southwest Petroleum University,School of Electrical Engineering and Information
来源
Cluster Computing | 2019年 / 22卷
关键词
Oil and gas SCADA system; Decision tree; Factor space; Fuzzy reasoning; Causality Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
At present, the oil and gas SCADA system is facing severe information security threats, and the information security assessment for the existing SCADA system is an important response measure. In order to solve the problem that the standard of information security assessment of industrial control system are not perfect and the evaluation objects are fuzzy, this study put forward a novel method of oil and gas SCADA security assessment based on causality analysis. Firstly, defense security assessment technology route with pre-defense,post-defense was introduced and the evaluation indexes were mapped to the pre-defense and post-defense factors, and the pre-defense and post-defense scoring tables for oil and gas SCADA system information security were developed, the evaluation factors were formed as causality diagram table; then the factor space theory was used to evaluate and model the information security of oil and gas SCADA system, and the model was formally described. Finally causality analysis evaluation method of fuzzy Mamdani reasoning was adopted to evaluate factors neurons in the proposed model. The results show that the average accuracy of the causality analysis and the decision tree algorithm is 92.06 and 91.45% respectively. The causality analysis method based on factor space has a good effect on SCADA information security assessment. The conclusions of this study can not only be applied to oil and gas SCADA security risk assessment, but also provide a reference for other industry security assessment.
引用
收藏
页码:5491 / 5503
页数:12
相关论文
共 50 条
  • [41] A New Evaluation Model for Information Security Risk Management of SCADA Systems
    Lin, Kuo-Sui
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER PHYSICAL SYSTEMS (ICPS 2019), 2019, : 757 - 762
  • [42] Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov
    Zhang, Tao
    Zhao, Kun
    Yang, Ming
    Gao, Tilei
    Xie, Wanyu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [43] Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities
    Karabey, Bugra
    Baykal, Nazife
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 297 - 304
  • [44] Modifications of the Formal Risk Analysis and Assessment for the Information System Security
    El Fray, Imed
    Wilinski, Artur
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2024, 18 (02) : 317 - 332
  • [45] The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation
    Li Guohong
    Cai Yongkai
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 2027 - 2031
  • [46] Risk Assessment for Information Security Based on Fuzzy Membership Matrix
    Bai, Yan
    Yao, Zhong
    Li, Hong
    Zhang, Yong-Qiang
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 547 - +
  • [47] The Information Security Risk Assessment Model Based on GA - BP
    Song, Yongqiang
    Shen, Yongjun
    Zhang, Guidong
    Hu, Yuming
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 119 - 122
  • [48] Information security risk assessment based on G-ANP
    Zhao, G. (zhaogang@bistu.edu.cn), 1761, Tsinghua University (53):
  • [49] Grey Evaluation Method on Security Risk Assessment of Power Information System
    Liu, Ren
    Niu, Dongxiao
    APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 2157 - 2163
  • [50] A risk assessment standard and application method of computer network information security
    Sun, T.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2018, 123 : 91 - 91