首页> 外文会议>IEEE Military Communications Conference >EVIDENCE-BASED TECHNIQUES for EVALUATING CYBER PROTECTION SYSTEMS for CRITICAL INFRASTRUCTURES
【24h】

EVIDENCE-BASED TECHNIQUES for EVALUATING CYBER PROTECTION SYSTEMS for CRITICAL INFRASTRUCTURES

机译:用于评估Cyber​​ Protection Systems的基于证据的技术

获取原文

摘要

Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). Previous research has developed a risk assessment methodology that accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay and respond and accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. This research is focused on evidence-based techniques (which are a generalization of probability theory) for evaluating the security posture of the cyber protection systems typically found in critical infrastructure facilities. It presents category-based approaches to characterizing both cyber threats and security primitives such as authentication and network access control. A path-based approach is then used wherein various security primitives protect each link (e.g., attack step) in a given path. The end goal is to evaluate the conditional risk that a given adversary category can traverse an attack path and thereby cause a given consequence of concern. This paper's examples focus on cyber-based attack paths.
机译:评估对大规模关键基础设施的恶性攻击的风险需要修改现有方法。现有风险评估方法分别考虑物理安全和网络安全。因此,它们不准确地模拟涉及击败物理保护和网络保护元件的攻击(例如,黑客在强制进入之前关闭警报系统)。以前的研究已经开发出一种风险评估方法,其占物理和网络安全的账户,同时保留了传统的检测,延迟和响应和核算和核算设施可能能够从或减轻成功结果的可能性发生严重后果之前的攻击。该研究专注于基于证据的技术(这是概率理论的概念化),用于评估通常在关键基础设施设施中发现的网络保护系统的安全姿势。它呈现基于类别的方法,以表征网络威胁和安全原语,例如身份验证和网络访问控制。然后使用基于路径的方法,其中各种安全基元在给定路径中保护每个链路(例如,攻击步骤)。最终目标是评估给定的对手类别可以遍历攻击路径的条件风险,从而导致关注的给定后果。本文的示例侧重于基于网络的攻击路径。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号