Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization

被引:2
作者
Gao, Xin [1 ]
Zhou, Yang [1 ]
Xu, Lijuan [1 ]
Zhao, Dawei [1 ]
机构
[1] Qilu Univ Technol, Shandong Acad Sci, Shandong Comp Sci Ctr, Natl Supercomp Ctr Jinan,Shandong Prov Key Lab Com, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Bayesian attack graph; optimal protection strategy; Q-Learning; particle swarm optimization; SYSTEMS; CYBERSECURITY; VULNERABILITY; NETWORKS;
D O I
10.3390/e24121727
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
With the rapid development of Industrial Internet of Things technology, the industrial control system (ICS) faces more and more security threats, which may lead to serious risks and extensive damage. Naturally, it is particularly important to construct efficient, robust, and low-cost protection strategies for ICS. However, how to construct an objective function of optimal security protection strategy considering both the security risk and protection cost, and to find the optimal solution, are all significant challenges. In this paper, we propose an optimal security protection strategy selection model and develop an optimization framework based on Q-Learning particle swarm optimization (QLPSO). The model performs security risk assessment of ICS by introducing the protection strategy into the Bayesian attack graph. The QLPSO adopts the Q-Learning to improve the local optimum, insufficient diversity, and low precision of the PSO algorithm. Simulations are performed on a water distribution ICS, and the results verify the validity and feasibility of our proposed model and the QLPSO algorithm.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Abed-Alguni Bilal H., 2016, International Journal of Artificial Intelligence, V14, P71
  • [2] Ali Meerza SyedIrfan., 2019, IEEE 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), P1
  • [3] Babu B, 2017, 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), P47, DOI 10.1109/Anti-Cybercrime.2017.7905261
  • [4] Bandyopadhyay S., 2013, Some Single- and Multiobjective Optimization Techniques BT - Unsupervised Classification: Similarity Measures, Classical and Metaheuristic Approaches, and Applications, P17, DOI [DOI 10.1007/978-3-642-32451-2_2, 10.1007/978-3-642-32451-2_2]
  • [5] Security for Process Control Systems An Overview
    Brandle, Markus
    Naedele, Martin
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (06) : 24 - 29
  • [6] BUTLER S, 2002, P S REQ ENG INF SEC
  • [7] Butler SA, 2002, ICSE 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P232, DOI 10.1109/ICSE.2002.1007971
  • [8] Lessons from Stuxnet
    Chen, Thomas M.
    Abu-Nimeh, Saeed
    [J]. COMPUTER, 2011, 44 (04) : 91 - 93
  • [9] Clarke G., 2004, PRACTICAL MODERN SCA
  • [10] Q-Learning: Theory and Applications
    Clifton, Jesse
    Laber, Eric
    [J]. ANNUAL REVIEW OF STATISTICS AND ITS APPLICATION, VOL 7, 2020, 2020, 7 : 279 - 301