Methods to Analyze Critical Facilities in Energy with Regard to Cyber Threats

被引:0
|
作者
Gaskova, Daria A. [1 ]
Massel, Aleksei G. [1 ]
机构
[1] Russian Acad Sci, Siberian Branch, Melentiev Energy Syst Inst, Lermontov Str 130, Irkutsk, Russia
来源
PROCEEDINGS OF THE VTH INTERNATIONAL WORKSHOP CRITICAL INFRASTRUCTURES: CONTINGENCY MANAGEMENT, INTELLIGENT, AGENT-BASED, CLOUD COMPUTING AND CYBER SECURITY (IWCI 2018) | 2018年 / 158卷
关键词
Critical facilities; cyber-threats; semantic modeling;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The article describes the methods proposed by the authors used for the analysis of critical facilities in the energy sector, taking into account cyber-threats. The authors focus on to an approach that enables analyzing and simulating the entire chain of events "Vulnerabilities - Cyber-threats - Energy Security Threats - Consequences." This approach can be used in the development of an intelligent system to support decision-making on the identification of critical energy facilities in strategic planning from the point of view of cybersecurity violations.
引用
收藏
页码:62 / 67
页数:6
相关论文
共 6 条
  • [1] Identification of Critical Objects in Reliance on Cyber Threats in the Energy Sector
    Massel, Aleksei
    Gaskova, Daria
    ACTA POLYTECHNICA HUNGARICA, 2020, 17 (08) : 61 - 73
  • [2] PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats
    Papadopoulos, Lazaros
    Karteris, Antonios
    Soudris, Dimitrios
    Munoz-Navarro, Eva
    Hernandez-Montesinos, Juan Jose
    Paul, Stephane
    Museux, Nicolas
    Koenig, Sandra
    Egger, Manuel
    Schauer, Stefan
    Hingant Gomez, Javier
    Hadjina, Tamara
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [3] Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory
    V. M. Krundyshev
    Automatic Control and Computer Sciences, 2020, 54 : 900 - 906
  • [4] Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory
    Krundyshev, V. M.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 900 - 906
  • [5] Intrusion Detection System using Honey Token based Encrypted Pointers to Mitigate Cyber Threats for Critical Infrastructure Networks
    Asif, Muhammad Kamran
    Al-Harthi, Yahya Subhi
    2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 1266 - 1270
  • [6] Formation of a list of critical facilities in the gas transportation system of Russia in terms of energy security
    Senderov, S. M.
    Edelev, A. V.
    ENERGY, 2019, 184 : 105 - 112