Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization

被引:2
作者
Gao, Xin [1 ]
Zhou, Yang [1 ]
Xu, Lijuan [1 ]
Zhao, Dawei [1 ]
机构
[1] Qilu Univ Technol, Shandong Acad Sci, Shandong Comp Sci Ctr, Natl Supercomp Ctr Jinan,Shandong Prov Key Lab Com, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Bayesian attack graph; optimal protection strategy; Q-Learning; particle swarm optimization; SYSTEMS; CYBERSECURITY; VULNERABILITY; NETWORKS;
D O I
10.3390/e24121727
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
With the rapid development of Industrial Internet of Things technology, the industrial control system (ICS) faces more and more security threats, which may lead to serious risks and extensive damage. Naturally, it is particularly important to construct efficient, robust, and low-cost protection strategies for ICS. However, how to construct an objective function of optimal security protection strategy considering both the security risk and protection cost, and to find the optimal solution, are all significant challenges. In this paper, we propose an optimal security protection strategy selection model and develop an optimization framework based on Q-Learning particle swarm optimization (QLPSO). The model performs security risk assessment of ICS by introducing the protection strategy into the Bayesian attack graph. The QLPSO adopts the Q-Learning to improve the local optimum, insufficient diversity, and low precision of the PSO algorithm. Simulations are performed on a water distribution ICS, and the results verify the validity and feasibility of our proposed model and the QLPSO algorithm.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem
    Viduto, Valentina
    Maple, Carsten
    Huang, Wei
    Lopez-Perez, David
    [J]. DECISION SUPPORT SYSTEMS, 2012, 53 (03) : 599 - 610
  • [42] Exploring attack graph for cost-benefit security hardening: A probabilistic approach
    Wang, Shuzhen
    Zhang, Zonghua
    Kadobayashi, Youki
    [J]. COMPUTERS & SECURITY, 2013, 32 : 158 - 169
  • [43] Wang YY, 2010, CHIN CONTR CONF, P5329
  • [44] WATKINS CJCH, 1992, MACH LEARN, V8, P279, DOI 10.1007/BF00992698
  • [45] Wilhoit K., 2013, TREND MICRO, V10
  • [46] Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph
    Xu, Lijuan
    Wang, Bailing
    Wu, Xiaoming
    Zhao, Dawei
    Zhang, Lei
    Wang, Zhen
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (02): : 703 - 715
  • [47] Cost-Aware Network Hardening with Limited Budget using Compact Attack Graphs
    Yigit, Beytullah
    Gur, Gurkan
    Alagoz, Fatih
    [J]. 2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 152 - 157
  • [49] Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification
    Zhao, Dawei
    Xiao, Gaoxi
    Wang, Zhen
    Wang, Lianhai
    Xu, Lijuan
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (12): : 7823 - 7837
  • [50] Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation
    Zhao, Dawei
    Wang, Lianhai
    Wang, Zhen
    Xiao, Gaoxi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (07) : 1755 - 1767