2018
DOI: 10.1002/rnc.4375
|View full text |Cite
|
Sign up to set email alerts
|

Security measure allocation for industrial control systems: Exploiting systematic search techniques and submodularity

Abstract: To protect industrial control systems from cyberattacks, multiple layers of security measures need to be allocated to prevent critical security vulnerabilities.However, both finding the critical vulnerabilities and then allocating security measures in a cost-efficient way become challenging when the number of vulnerabilities and measures is large. This paper proposes a framework that can be used once this is the case. In our framework, the attacker exploits security vulnerabilities to gain control over some of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(20 citation statements)
references
References 55 publications
0
4
0
Order By: Relevance
“…Meanwhile, the model of the dynamical system to be protected is also used for control system security [22], [23]. For example, identifying existence of stealthy attacks and removing the vulnerability require the dynamical model [24], [25], and attack detection performance can be enhanced by model knowledge [26]. Our Bayesian defense mechanisms can be interpreted as a generalization of those approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, the model of the dynamical system to be protected is also used for control system security [22], [23]. For example, identifying existence of stealthy attacks and removing the vulnerability require the dynamical model [24], [25], and attack detection performance can be enhanced by model knowledge [26]. Our Bayesian defense mechanisms can be interpreted as a generalization of those approaches.…”
Section: Related Workmentioning
confidence: 99%
“…To the best of our knowledge, these techniques are developed with the objective of performing risk assessment offline. For example, Milosevic et al [32] propose a framework for security measure allocation given certain impact and attack complexity metrics. Murguia et al [37] use the volume of ellipsoidal approximations of reachable sets under stealthy attacks as a measure of impact.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, the model of the dynamical system to be protected is also used for control system security [22], [23]. For example, identifying existence of stealthy attacks and removing the vulnerability require the dynamical model [24], [25], and attack detection performance can be enhanced by model knowledge [26]. Our Bayesian defense mechanisms can be interpreted as a general description of those approaches.…”
Section: Related Workmentioning
confidence: 99%