4.5 Article

Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game

Journal

COMPUTERS & SECURITY
Volume 102, Issue -, Pages -

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2020.102138

Keywords

Industrial control systems; Bayesian game; Attack-defense model; Bayesian Nash equilibrium; Threats propagation matrix

Ask authors/readers for more resources

This paper presents a unified methodology for quantitatively and automatically analyzing cyber-physical attacks on ICSs. By defining the weighted colored Petri net and basic cyber-physical attack models, as well as proposing a method to calculate weights in attack models, the study shows stable weights and establishes threat propagation matrix and security state vector. Additionally, a cyber-physical attack path analysis algorithm is designed to discover possible attack paths with specific attack losses.
Industrial control systems (ICSs) are distributed complex cyber physical systems (CPSs). The core parts of ICSs are usually ultimate targets of attackers but being protected strictly and difficult to attack directly. Attackers tend to take cyber-physical attacks via multiple attacksteps from outer nodes with less protection. Then, threats propagate from one node to another until reaching the core assets or being detected. This paper develops a unified methodology which can model and analyze the cyber-physical attacks on ICSs quantitatively and automatically. We define the weighted colored Petri net and propose the basic cyber-physical attack models. Second, we propose the method to calculate the weights in attack models by modeling threat propagation between two nodes as mixed-strategy Bayesian attack-defense game with incomplete information and solving the refined Bayesian Nash Equilibrium. Results show that weights in the cyber-physical attack model (CPAM) are nearly stable even when parameters change. Moreover, we build threat propagation matrix and security state vector and further design the cyber-physical attack path analysis algorithm which can discover possible attack paths with specific attack losses. The case study verifies our methodology and evaluations show that our methodology has good time performance within limited node number. This work can help protect ICSs more efficiently. (c) 2020 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available