2014 11th International ISC Conference on Information Security and Cryptology 2014
DOI: 10.1109/iscisc.2014.6994036
|View full text |Cite
|
Sign up to set email alerts
|

A method for modeling and evaluation of the security of cyber-physical systems

Abstract: Quantitative evaluation of security has always been one of the challenges in the field of computer security. The integration of computing and communication technologies with physical components, has introduced a variety of new security risks, which threaten cyber-physical components. It is possible that an attacker damage a physical component with cyber attack. In this paper, we propose a new approach for modeling and quantitative evaluation of the security of cyber-physical systems (CPS). The proposed method,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
2

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 20 publications
0
3
0
2
Order By: Relevance
“…In this work, the attacker is assumed to be able to compromise both physical and cyber weaknesses of the systems and the adversary model was able to capture the capabilities and spatial distribution of the adversary. In [13] the authors used a state-based stochastic model to formalize the security properties of real-time systems. They assumed that the system had Markovian property and considering that general probability distributions are assigned to its transitions, the resulting model is a semi-Markov chain.…”
Section: A Formalization Of Attacksmentioning
confidence: 99%
“…In this work, the attacker is assumed to be able to compromise both physical and cyber weaknesses of the systems and the adversary model was able to capture the capabilities and spatial distribution of the adversary. In [13] the authors used a state-based stochastic model to formalize the security properties of real-time systems. They assumed that the system had Markovian property and considering that general probability distributions are assigned to its transitions, the resulting model is a semi-Markov chain.…”
Section: A Formalization Of Attacksmentioning
confidence: 99%
“…In [8], the approach tries to design and to implement a robust cyber physical system, and [9] attempts to model ontology-based dependability in CPSs using FMEA techniques are outlined. Mathematical approaches were used in [10] to model security risks of CPSs and to quantitatively evaluate their risks. Dependability of self-optimizing systems was studied and analysed in [11], where various methods covering conceptual design, and development phases were introduced.…”
Section: Review Of Literaturementioning
confidence: 99%
“…Среди них особую роль играют модели, основанные на теории марковских случайных процессов, так как хорошо разработанный соответствующий математический аппарат во многих ситуациях позволяет получить исчерпывающее численное или даже аналитическое решение сформулированных с их помощью задач. Для иллюстрации этого тезиса достаточно отметить чрезвычайно широкой спектр приложений марковских моделей к проблемам кибербезопасности: обнаружение вторжений и аномалий в компьютерных системах [1][2][3][4], моделирование процессов распространения компьютерных вирусов [5][6][7][8], управление рисками информационной безопасности [9,10], моделирование процессов возникновения киберугроз и эксплуатации уязвимостей в информационных и кибер-физических системах [11][12][13].…”
unclassified