【24h】

Construction of a Cyber Attack Model for Nuclear Power Plants

机译:核电厂网络攻击模型的构建

获取原文

摘要

The consideration of how a compromised digital component can impact neighboring components is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional probabilistic risk assessment (PRA). This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to different classes of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way. thereby reducing the computing resources required for analyzing large systems.
机译:考虑受损的数字组件如何影响相邻组件对于理解网络攻击的进展至关重要。一个组件可能对另一组件产生的影响程度取决于多种因素,包括资源共享(例如网络带宽或处理能力),组件之间的信任级别以及包含分段设备(例如防火墙)。传统概率风险评估(PRA)通常不考虑通过数字世界特有的机制进行组件之间的交互。这意味着,如果只看常规事故序列,可能会错过在攻击过程中可能发生的事件序列。本文提出了一种方法,从初始攻击向量开始,可以对网络攻击的进程进行建模。通过考虑系统中数字组件的某些属性来模拟攻击的传播。这些属性确定了组件对不同类型攻击的潜在脆弱性,以及一旦攻击者控制了设备,攻击者便获得了相应的能力。属性的使用允许相似的组件(具有相同属性集的组件)以相同的方式建模。从而减少了分析大型系统所需的计算资源。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号