Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization

被引:2
作者
Gao, Xin [1 ]
Zhou, Yang [1 ]
Xu, Lijuan [1 ]
Zhao, Dawei [1 ]
机构
[1] Qilu Univ Technol, Shandong Acad Sci, Shandong Comp Sci Ctr, Natl Supercomp Ctr Jinan,Shandong Prov Key Lab Com, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Bayesian attack graph; optimal protection strategy; Q-Learning; particle swarm optimization; SYSTEMS; CYBERSECURITY; VULNERABILITY; NETWORKS;
D O I
10.3390/e24121727
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
With the rapid development of Industrial Internet of Things technology, the industrial control system (ICS) faces more and more security threats, which may lead to serious risks and extensive damage. Naturally, it is particularly important to construct efficient, robust, and low-cost protection strategies for ICS. However, how to construct an objective function of optimal security protection strategy considering both the security risk and protection cost, and to find the optimal solution, are all significant challenges. In this paper, we propose an optimal security protection strategy selection model and develop an optimization framework based on Q-Learning particle swarm optimization (QLPSO). The model performs security risk assessment of ICS by introducing the protection strategy into the Bayesian attack graph. The QLPSO adopts the Q-Learning to improve the local optimum, insufficient diversity, and low precision of the PSO algorithm. Simulations are performed on a water distribution ICS, and the results verify the validity and feasibility of our proposed model and the QLPSO algorithm.
引用
收藏
页数:17
相关论文
共 50 条
  • [11] A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems
    Cruz, Tiago
    Rosa, Luis
    Proenca, Jorge
    Maglaras, Leandros
    Aubigny, Matthieu
    Lev, Leonid
    Jiang, Jianmin
    Simoes, Paulo
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (06) : 2236 - 2246
  • [12] David A., 2007, MULTIPLE EFFORTS SEC
  • [13] A fast and elitist multiobjective genetic algorithm: NSGA-II
    Deb, K
    Pratap, A
    Agarwal, S
    Meyarivan, T
    [J]. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) : 182 - 197
  • [14] Optimal security hardening on attack tree models of networks: a cost-benefit analysis
    Dewri, Rinku
    Ray, Indrajit
    Poolsappasit, Nayot
    Whitley, Darrell
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (03) : 167 - 188
  • [15] Fan XH, 2015, 2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC)
  • [16] Exploiting attack-defense trees to find an optimal set of countermeasures
    Fila, Barbara
    Widel, Wojciech
    [J]. 2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 395 - 410
  • [17] Frigault Marcel, 2008, 2008 IEEE 32nd International Computer Software and Applications Conference (COMPSAC), P698, DOI 10.1109/COMPSAC.2008.88
  • [18] Gao Ni, 2016, Computer Engineering and Applications, V52, P125, DOI 10.3778/j.issn.1002-8331.1511-0075
  • [19] 基于贝叶斯攻击图的动态安全风险评估模型
    高妮
    高岭
    贺毅岳
    雷艳婷
    高全力
    [J]. 四川大学学报(工程科学版), 2016, 48 (01) : 111 - 118
  • [20] Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index
    Gonzalez-Granadillo, G.
    Garcia-Alfaro, J.
    Alvarez, E.
    El-Barbori, M.
    Debar, H.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2015, 47 : 13 - 34