Skip to main content
Top
Published in: The Journal of Supercomputing 14/2023

22-04-2023

A risk assessment model for similar attack scenarios in industrial control system

Authors: Yaofang Zhang, Zibo Wang, Yingzhou Wang, Kuan Lin, Tongtong Li, Hongri Liu, Chao Li, Bailing Wang

Published in: The Journal of Supercomputing | Issue 14/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Although the expansion of attack types against industrial control systems is limited, the available means that violate the same security strategy emerge endlessly. However, the high availability and real-time requirements of industrial control systems restrict the application of some countermeasures that require massive resources. To solve this problem, this paper proposes a low learning-cost risk assessment model for similar scenarios, which enables the formulation of defense strategies for system risks in advance. To lay the foundation for this method, we firstly aggregate the attack means into limited attack types according to word clustering to address the classification challenge caused by unknown attacks. Then, similarity and statistical methods are combined to predict the next attack type. Subsequently, the hidden Markov model is used to map attack types and security states to obtain the forecasting results of the next security state. Based on this, the risk value is calculated through these prediction and forecasting results, and the system relevance and alert timeliness are considered in the assessment stage. We break the scenario limitations and verify the advantages of our model in a known scenario and another similar scenario with unknown attacks. The experimental results show that our model can deal with unknown attacks in similar scenarios and has excellent scenario migration ability. Meanwhile, the changing trend of the risk value is in consistence with the actual data, which also confirms that the assessment model can forecast the future risk situation of the system accurately and comprehensively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Lee S, Lee S, Yoo H, Kwon S, Shon T (2018) Design and implementation of cybersecurity testbed for industrial iot systems. J Supercomput 74:4506–4520CrossRef Lee S, Lee S, Yoo H, Kwon S, Shon T (2018) Design and implementation of cybersecurity testbed for industrial iot systems. J Supercomput 74:4506–4520CrossRef
9.
go back to reference Shinde PS, Ardhapurkar SB (2016) Cyber security analysis using vulnerability assessment and penetration testing. In: 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), pp. 1–5. IEEE, Coimbatore, India. https://doi.org/10.1109/STARTUP.2016.7583912 Shinde PS, Ardhapurkar SB (2016) Cyber security analysis using vulnerability assessment and penetration testing. In: 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), pp. 1–5. IEEE, Coimbatore, India. https://​doi.​org/​10.​1109/​STARTUP.​2016.​7583912
13.
go back to reference Albasheer H, Md Siraj M, Mubarakali A, Elsier Tayfour O, Salih S, Hamdan M, Khan S, Zainal A, Kamarudeen S (2022) Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey. Sensors 22(4):1494. https://doi.org/10.3390/s22041494CrossRef Albasheer H, Md Siraj M, Mubarakali A, Elsier Tayfour O, Salih S, Hamdan M, Khan S, Zainal A, Kamarudeen S (2022) Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey. Sensors 22(4):1494. https://​doi.​org/​10.​3390/​s22041494CrossRef
14.
go back to reference Wu M, Moon YB (2020) Alert correlation for detecting cyber-manufacturing attacks and intrusions. J Comput Inf Sci Eng 20(1):011004CrossRef Wu M, Moon YB (2020) Alert correlation for detecting cyber-manufacturing attacks and intrusions. J Comput Inf Sci Eng 20(1):011004CrossRef
15.
go back to reference Sun J, Gu L, Chen K (2020) An efficient alert aggregation method based on conditional rough entropy and knowledge granularity. Entropy 22(3):324MathSciNetCrossRef Sun J, Gu L, Chen K (2020) An efficient alert aggregation method based on conditional rough entropy and knowledge granularity. Entropy 22(3):324MathSciNetCrossRef
21.
go back to reference Wang W, Jiang R, Jia Y, Li A, Chen Y (2017) Kgbiac: knowledge graph based intelligent alert correlation framework. In: Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings, pp. 523–530. Springer Wang W, Jiang R, Jia Y, Li A, Chen Y (2017) Kgbiac: knowledge graph based intelligent alert correlation framework. In: Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings, pp. 523–530. Springer
27.
go back to reference Khan MA, Abuhasel KA (2021) An evolutionary multi-hidden markov model for intelligent threat sensing in industrial internet of things. J Supercomput 77(6):6236–6250CrossRef Khan MA, Abuhasel KA (2021) An evolutionary multi-hidden markov model for intelligent threat sensing in industrial internet of things. J Supercomput 77(6):6236–6250CrossRef
28.
go back to reference Wang T, Zeng P, Zhao J, Liu X, Zhang B (2022) Identification of influential nodes in industrial networks based on structure analysis. Symmetry 14(2):211CrossRef Wang T, Zeng P, Zhao J, Liu X, Zhang B (2022) Identification of influential nodes in industrial networks based on structure analysis. Symmetry 14(2):211CrossRef
Metadata
Title
A risk assessment model for similar attack scenarios in industrial control system
Authors
Yaofang Zhang
Zibo Wang
Yingzhou Wang
Kuan Lin
Tongtong Li
Hongri Liu
Chao Li
Bailing Wang
Publication date
22-04-2023
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 14/2023
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05269-1

Other articles of this Issue 14/2023

The Journal of Supercomputing 14/2023 Go to the issue

Premium Partner