2016
DOI: 10.1007/978-3-319-45477-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Modelling Cost-Effectiveness of Defenses in Industrial Control Systems

Abstract: Abstract. Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use of modern IT technologies enables cyber attacks to disrupt the operation of ICS. Advanced Persistent Threats (APT) are the most threatening attacks to ICS due to their long persistence and destructive cyberphysical effects to ICS. This paper considers a simulation of attackers and defenders of an ICS, where the defender must consider the cost-efficiency of implementing defensive measures within the sys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

1
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 19 publications
1
3
0
Order By: Relevance
“…Poli (2008) identified active applications of PSO, and also pointed out that very little work has undertaken by applying PSO to cyber security problems, with only 1.3% of the literature covering the whole security field, such as security predictions (Gao et al 2011), intrusion detection (Srinoy 2007) and authentication (Karnan and Akila 2010). A similar PSO-based simulation was also employed to investigate the impact of cost-efficiency of defence on deciding the optimal defence for ICS in our previous work (Fielder et al 2016) . Figure 2 depicts the development of optimal solutions by using our simulation.…”
Section: Related Worksupporting
confidence: 43%
“…Poli (2008) identified active applications of PSO, and also pointed out that very little work has undertaken by applying PSO to cyber security problems, with only 1.3% of the literature covering the whole security field, such as security predictions (Gao et al 2011), intrusion detection (Srinoy 2007) and authentication (Karnan and Akila 2010). A similar PSO-based simulation was also employed to investigate the impact of cost-efficiency of defence on deciding the optimal defence for ICS in our previous work (Fielder et al 2016) . Figure 2 depicts the development of optimal solutions by using our simulation.…”
Section: Related Worksupporting
confidence: 43%
“…game theory, combinatorial optimisation and a hybrid of the two) to find effective defence for security managers. The work [5] provided a co-evolutionary agent-based simulation to find effective defences by considering the cost-efficiency of defence in various zones of ICS.…”
Section: Related Workmentioning
confidence: 44%
“…programs that detect abnormal behaviors [12], [13], botnet detection [14] and detecting intrusions in Internet of Things [15]. Though conservative protective mechanisms may be reformed and usefully arrayed to guard ICS against cyber-outbreaks [16], [17], still there exist numerous complications that obstruct this course.…”
Section: Related Workmentioning
confidence: 99%