Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

被引:32
作者
Shin, Jinsoo [1 ]
Son, Hanseong [2 ]
Heo, Gyunyoung [1 ]
机构
[1] Kyung Hee Univ, Dept Nucl Engn, 1732 Deogyeong Daero, Yongin 446701, Gyeonggi Do, South Korea
[2] Joongbu Univ, Comp & Game Sci, 201 Daehak Ro, Geumsan Gun 312702, Chungnam, South Korea
基金
新加坡国家研究基金会;
关键词
Activitye-Quality; Architecture Analysis; Bayesian Network; Cyber Security; Reactor Protection System; Research Reactor;
D O I
10.1016/j.net.2016.11.004
中图分类号
TL [原子能技术]; O571 [原子核物理学];
学科分类号
0827 ; 082701 ;
摘要
Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks. Copyright (C) 2017, Published by Elsevier Korea LLC on behalf of Korean Nuclear Society.
引用
收藏
页码:517 / 524
页数:8
相关论文
共 21 条
  • [1] BERNARDO JM, 1979, J R STAT SOC B, V41, P113
  • [2] Bonnie Z., 2011, 2011 INT C 4 INT C C
  • [3] Collins S., 2012, Journal of Policing, Intelligence and Counter Terrorism, V7, P80, DOI DOI 10.1080/18335330.2012
  • [4] Gao Wei., 2010, eCrime Researchers Summit (eCrime)
  • [5] Hobbs S., 2000, CYBER THREATS VIRUSE
  • [6] IAEA, 1993, IAEATECDOC719
  • [7] IEEE, 2010, 74322010 IEEE, DOI 10.1109/IEEESTD.2010.5542302
  • [8] 2010
  • [9] Karresand M., 2003, INF ASS WORKSH IEEE
  • [10] Kessler B., 2011, Strategic Insights, V10, P15