Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization

被引:2
作者
Gao, Xin [1 ]
Zhou, Yang [1 ]
Xu, Lijuan [1 ]
Zhao, Dawei [1 ]
机构
[1] Qilu Univ Technol, Shandong Acad Sci, Shandong Comp Sci Ctr, Natl Supercomp Ctr Jinan,Shandong Prov Key Lab Com, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Bayesian attack graph; optimal protection strategy; Q-Learning; particle swarm optimization; SYSTEMS; CYBERSECURITY; VULNERABILITY; NETWORKS;
D O I
10.3390/e24121727
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
With the rapid development of Industrial Internet of Things technology, the industrial control system (ICS) faces more and more security threats, which may lead to serious risks and extensive damage. Naturally, it is particularly important to construct efficient, robust, and low-cost protection strategies for ICS. However, how to construct an objective function of optimal security protection strategy considering both the security risk and protection cost, and to find the optimal solution, are all significant challenges. In this paper, we propose an optimal security protection strategy selection model and develop an optimization framework based on Q-Learning particle swarm optimization (QLPSO). The model performs security risk assessment of ICS by introducing the protection strategy into the Bayesian attack graph. The QLPSO adopts the Q-Learning to improve the local optimum, insufficient diversity, and low precision of the PSO algorithm. Simulations are performed on a water distribution ICS, and the results verify the validity and feasibility of our proposed model and the QLPSO algorithm.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Herold N., 2016, P INT S FDN PRACTICE, P68
  • [22] Q-Learning Algorithms: A Comprehensive Classification and Applications
    Jang, Beakcheol
    Kim, Myeonghwi
    Harerimana, Gaspard
    Kim, Jong Wook
    [J]. IEEE ACCESS, 2019, 7 : 133653 - 133667
  • [23] Jaquith A., 2007, SECURITY METRICS REP
  • [24] Kennedy J, 1995, 1995 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS PROCEEDINGS, VOLS 1-6, P1942, DOI 10.1109/icnn.1995.488968
  • [25] Kennedy J., 1995, P IEEE INT C NEURAL, V4, P1942, DOI DOI 10.1109/ICNN.1995.488968
  • [26] Kordy Barbara, 2017, Integrated Formal Methods. 13th International Conference, IFM 2017. Proceedings: LNCS 10510, P332, DOI 10.1007/978-3-319-66845-1_22
  • [27] Optimal Strategy Selection for Moving Target Defense Based on Markov Game
    Lei, Cheng
    Ma, Duo-He
    Zhang, Hong-Qi
    [J]. IEEE ACCESS, 2017, 5 : 156 - 169
  • [28] Cybersecurity in Distributed Power Systems
    Li, Zhiyi
    Shahidehpour, Mohammad
    Aminifar, Farrokh
    [J]. PROCEEDINGS OF THE IEEE, 2017, 105 (07) : 1367 - 1388
  • [29] Network vulnerability assessment using Bayesian networks
    Liu, Y
    Man, H
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 61 - 71
  • [30] Liu YX, 2019, IEEE C EVOL COMPUTAT, P815, DOI [10.1109/cec.2019.8790035, 10.1109/CEC.2019.8790035]