RETRACTED: Risk assessment for industrial control systems based on asymmetric connection cloud and Choquet integral (Retracted Article)

被引:0
作者
Li, Feng [1 ,2 ]
Zhu, Mozhong [1 ]
Lin, Ling [1 ]
机构
[1] Jimei Univ, Sch Sci, Xiamen 361021, Fujian, Peoples R China
[2] Jimei Univ, Digital Fujian Big Data Modeling & Intelligent Co, Sch Sci, Xiamen, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Industrial control systems; risk assessment; asymmetric connection cloud; choquet integral; SECURITY;
D O I
10.3233/JIFS-234686
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Once industrial control systems are targeted by cyber-attacks, the consequences can be severe, including asset loss, environmental pollution, and public security risks. Risk assessment is an important way to ensure that industrial control systems operate efficiently, steadily and safely. The purpose of this paper is to develop a risk assessment model for industrial control systems based on asymmetric connection cloud and Choquet integral, which fully takes into account the fact that values of risk indicators are often fuzzy, random, asymmetrically distributed in finite intervals, and there are interactions among different indicators. To do so, we first establish a risk assessment index system to ensure the full reflection of availability, integrity, and confidentiality in the results of risk assessment for industrial control systems. Then we establish classification standards for each evaluation indicator based on the importance of assets, vulnerabilities, and threats in evaluating the risk of industrial control systems. Next we develop a risk assessment model based on asymmetric connection cloud and Choquet integral to determine the risk level of industrial control systems. In the following, an example is provided to demonstrate the feasibility and reliability of this proposed model. The experimental results have demonstrated a high level of credibility in assessing cyber-attacks by the proposed model, indicating its potential for analyzing the current security and risk posture of industrial control systems.
引用
收藏
页码:6589 / 6605
页数:17
相关论文
共 50 条
  • [41] Risk-Based Scheduling of Security Tasks in Industrial Control Systems With Consideration of Safety
    Zhou, Chunjie
    Li, Xuan
    Yang, Shuanghua
    Tian, Yu-Chu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (05) : 3112 - 3123
  • [42] SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering
    Liu, Kaixiang
    Xie, Yongfang
    Xie, Shiwen
    Sun, Limin
    JOURNAL OF PROCESS CONTROL, 2023, 132
  • [43] AutomationML Meets Bayesian Networks: A Comprehensive Safety-Security Risk Assessment in Industrial Control Systems
    Bhosale, Pushparaj
    Kastner, Wolfgang
    Sauter, Thilo
    IEEE OPEN JOURNAL OF THE INDUSTRIAL ELECTRONICS SOCIETY, 2024, 5 : 823 - 835
  • [44] Risk Assessment of Information Security in Communication-Based Train Control Systems Based on AHP Fuzzy Comprehensive Evaluation
    Kuang, Xiangqi
    Sun, Shiwei
    Zeng, Qinghui
    2024 7TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND BIG DATA, ICAIBD 2024, 2024, : 247 - 252
  • [45] Systematic Risk Assessment of Cloud Computing Systems using a Combined Model-based Approach
    Mohammadi, Nazila Gol
    Goeke, Ludger
    Heisel, Maritta
    Surridge, Mike
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS (ICEIS), VOL 2, 2020, : 53 - 66
  • [46] A Cloud-Based Tool for Integrating Occupational Risk Assessment Within Management Systems for SMEs
    De Merich, Diego
    Gnoni, Maria Grazia
    Malorgio, Brunella
    Micheli, Guido J. L.
    Piga, Giusi
    Sala, Guido
    Tornese, Fabiana
    SAFETY, 2020, 6 (04)
  • [47] An access control model for electronic flight bag systems based on risk assessment
    Yang H.
    Li W.
    Lu Z.
    Gaojishu Tongxin/Chinese High Technology Letters, 2010, 20 (07): : 668 - 673
  • [48] A Security Posture Assessment of Industrial Control Systems Based on Evidential Reasoning and Belief Rule Base
    Song, Huishan
    Yuan, Yanbin
    Wang, Yuhe
    Yang, Jianbai
    Luo, Hang
    Li, Shiming
    SENSORS, 2024, 24 (22)
  • [49] Asset Analysis of Risk Assessment for IEC 61850-Based Power Control Systems-Part I: Methodology
    Liu, Nian
    Zhang, Jianhua
    Wu, Xu
    IEEE TRANSACTIONS ON POWER DELIVERY, 2011, 26 (02) : 869 - 875
  • [50] Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
    Abid, Ahlem
    Jemili, Farah
    Korbaa, Ouajdi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2217 - 2238