首页> 外文会议>Annual meeting of the Institute of Nuclear Materials Management >A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat
【24h】

A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

机译:内幕威胁核安保分析的博弈论方法

获取原文

摘要

Traditionally, measures to advance nuclear safety and nuclear security have been considered as serving distinct, and often conflicting, objectives. However, recently, the Safety-Security-Safeguards (3S) interface has become a key issue within both nuclear safety and security research. Ineffective management of the safety-security interface could potentially result in unintended security vulnerabilities and unintended impacts to emergency response activities. Insider threats can affect both safety and security of a nuclear installation. As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. Because insiders are capable of carrying out destructive actions not available to outsiders and have more opportunities to select the most vulnerable target and the best time to execute the malicious act, insider attacks are perhaps the key threat to the safety-security interface. This study examines a novel quantitative framework for performing nuclear security analysis against insider threat at a generic nuclear power plant. Most tools assessing the security threats focus on a limited number of attack pathways defined by the modeler and are based on probabilistic calculations. While this Probabilistic Risk Assessment (PRA) based approach is useful for preparing against fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions nor accounts for adversarial response and adaptation to defensive investments. This study adopts a game theoretic approach to address such problems. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. This defender-adversary interaction is demonstrated using a simplified test case problem.
机译:传统上,促进核安全和核安保的措施被认为服务于不同的目标,而且常常是相互矛盾的。但是,最近,安全-安保-保障(3S)接口已成为核安全和安保研究中的关键问题。安全-安全接口的管理不当可能会导致意想不到的安全漏洞,并对应急响应活动产生意想不到的影响。内部威胁可以影响核装置的安全性。由于拥有对设施和系统的授权访问权的个人将其受信任的职位用于未经授权的目的,内部人员可以利用其访问权和对设施的了解来绕过专用的安全措施。他们还可以利用自己的知识来利用安全相关系统中的任何漏洞,而安全关键型信息技术系统的网络安全性就是3S接口的重要示例。由于内部人员能够执行外部人员无法使用的破坏性行动,并且有更多机会选择最易受攻击的目标和最佳时间来执行恶意行为,因此内部人员攻击可能是对安全保护界面的主要威胁。这项研究研究了一种新颖的定量框架,用于对通用核电厂的内部威胁进行核安全分析。大多数评估安全威胁的工具都集中在建模者定义的有限数量的攻击途径上,并且都是基于概率计算的。尽管这种基于概率风险评估(PRA)的方法可用于防范安全系统组件故障之类的根本性随机事件,但它无法捕获对手的意图,也无法说明对手的反应以及对防御性投资的适应性。本研究采用博弈论方法来解决此类问题。防御者与对手之间的交互被建模为两人的Stackelberg游戏。从该游戏的平衡中找到两个玩家的最佳策略。防御者策略包括一组设计修改和/或施工后的安全性升级。攻击者策略涉及选择目标以及达到该目标的途径。使用简化的测试用例问题演示了防御者与对手之间的互动。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号