2019
DOI: 10.1111/risa.13382
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks

Abstract: Defenders have to enforce defense strategies by taking decisions on allocation of resources to protect the integrity and survivability of cyber-physical systems (CPSs) from intentional and malicious cyber attacks. In this work, we propose an adversarial risk analysis approach to provide a novel one-sided prescriptive support strategy for the defender to optimize the defensive resource allocation, based on a subjective expected utility model, in which the decisions of the adversaries are uncertain. This increas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 20 publications
(19 citation statements)
references
References 91 publications
0
16
0
3
Order By: Relevance
“…Kim et al [18] discussed the safety issues regarding train collisions caused by train safety signals and studied the vulnerability of CPS safety and security. Wang et al [19] realized the optimization of safety systems and enhancement of security strategies by means of optimizing defensive resource allocation, their measurement increased the robustness of CPS. A detailed analysis work was reported by Wang et al [20] to discuss the difference and connection between functional safety and information security, they also proposed the concept of security integration and integrated lifecycle model, which gives a preliminary description of how to realize the security integration of intelligent manufacturing process.…”
Section: Related Workmentioning
confidence: 99%
“…Kim et al [18] discussed the safety issues regarding train collisions caused by train safety signals and studied the vulnerability of CPS safety and security. Wang et al [19] realized the optimization of safety systems and enhancement of security strategies by means of optimizing defensive resource allocation, their measurement increased the robustness of CPS. A detailed analysis work was reported by Wang et al [20] to discuss the difference and connection between functional safety and information security, they also proposed the concept of security integration and integrated lifecycle model, which gives a preliminary description of how to realize the security integration of intelligent manufacturing process.…”
Section: Related Workmentioning
confidence: 99%
“…This is particularly true for cyber attacks, which are the focus of this work, since the majority of game-theoretic models assume that the defender moves first (e.g. designing a system, as in this work), and that the attacker moves after [9][10][11][12][13]. However, this means that an attacker can maximize the objective (of his/her malevolent act) and cyber attacks might be disguised from random failures, rendering the recovery difficult [14,15].…”
Section: Introductionmentioning
confidence: 99%
“…In all cases of applications, CPSs have to guarantee high reliability standards with respect to hardware components stochastic failures that can result in accidental scenarios leading the system towards unacceptable consequences, as well to cyber components failures (Wang et al (2019)).…”
Section: Introductionmentioning
confidence: 99%