Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things

被引:5
作者
Kerimkhulle, Seyit [1 ]
Dildebayeva, Zhulduz [2 ]
Tokhmetov, Akylbek [1 ]
Amirova, Akzhibek [1 ]
Tussupov, Jamalbek [1 ]
Makhazhanova, Ulzhan [1 ]
Adalbek, Alibek [1 ]
Taberkhan, Roman [1 ]
Zakirova, Alma [1 ]
Salykbayeva, Alua [3 ]
机构
[1] LN Gumilyov Eurasian Natl Univ, Dept Informat Syst, 2 Satpayev St, Astana 010008, Kazakhstan
[2] Int Engn Technol Univ, Dept Econ & Business, 89-21 Al Farabi Ave, Alma Ata 050060, Kazakhstan
[3] Tengizchevroil LLP, Dept Supply Chain Management, 3 Satpayev St, Atyrau 060001, Kazakhstan
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 10期
关键词
IIoT; security; threat; risk; fuzzy logic application; linguistic variables; fuzzy decision making;
D O I
10.3390/sym15101958
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This article addresses the issue of information security in the Industrial Internet of Things (IIoT) environment. Information security risk assessment in the IIoT is complicated by several factors: the complexity and heterogeneity of the system, the dynamic nature of the system, the distributed network infrastructure, the lack of standards and guidelines, and the increased consequences of security breaches. Given these factors, information security risk assessment in the IIoT requires a comprehensive approach adapted to the peculiarities and requirements of a particular system and industry. It is necessary to use specialized risk assessment methods and to take into account the context and peculiarities of the system. The method of information security risk assessment in the IIoT, based on the mathematical apparatus of fuzzy set theory, is proposed. This paper analyzes information security threats for IIoT systems, from which the most significant criteria are selected. The rules, based on which decisions are made, are formulated in the form of logical formulas containing input parameters. Three fuzzy inference systems are used: one to estimate the probability of threat realization, another to estimate the probable damage, and a final one to estimate the information security risk for the IIoT system. Based on the proposed method, examples of calculating the information security risk assessment in the IIoT environment are provided. The proposed scientific approach can serve as a foundation for creating expert decision support systems for designing IIoT systems.
引用
收藏
页数:29
相关论文
共 39 条
[1]   Fuzzy Expert System of Information Security Risk Assessment on the Example of Analysis Learning Management Systems [J].
Abdymanapov, S. A. ;
Muratbekov, M. ;
Altynbek, S. ;
Barlybayev, A. .
IEEE ACCESS, 2021, 9 :156556-156565
[2]   An Indicators-of-Risk Library for Industrial Network Security [J].
Adaros-Boye, Carolina ;
Kearney, Paul ;
Josephs, Mark ;
Ulmer, Hans .
ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
[3]   Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena .
3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, :126-130
[4]  
Amirova A., 2021, J. Theor. Appl. Inf. Technol, V99, P3449
[5]  
[Anonymous], 2022, Information Security, Cybersecurity and Privacy ProtectionGuidance on Managing Information Security Risks
[6]  
[Anonymous], 2023, ISA/IEC 62443
[7]  
[Anonymous], 2023, ISO/IEC 27400:2022
[8]  
Arrow K. J., 2013, Public investment, the rate of return, and optimal fiscal policy, P218, DOI [10.4324/9781315064178, DOI 10.4324/9781315064178]
[9]   Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT [J].
Atlam, Hany F. ;
Walters, Robert J. ;
Wills, Gary B. ;
Daniel, Joshua .
MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06) :2545-2557
[10]   Research on Information Security Risk Assessment Method Based on Fuzzy Rule Set [J].
Cai, Wentian ;
Yao, Huijun .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021