首页> 外文学位 >Concepts d'analyse de la vulnerabilite des infrastructures essentielles - Prise en compte de la cybernetique.
【24h】

Concepts d'analyse de la vulnerabilite des infrastructures essentielles - Prise en compte de la cybernetique.

机译:基本基础设施的漏洞分析的概念-考虑到控制论。

获取原文
获取原文并翻译 | 示例

摘要

Critical Infrastructures (CIs) are complex systems. For their operations, these infrastructures are increasingly using Supervisory Control And Data Acquisition (SCADA) systems. Management practices are therefore highly dependent on the cyber tools, but also on the data needed to make these tools work. Therefore, CIs are greatly vulnerable to degradation of data.;In this context, this research aims at developing the fundamentals of a method for analyzing the vulnerabilities of CIs towards the use of cyber data. By characterizing cyber vulnerability of CIs, it will be possible to improve the resilience of these networks and to foster a proactive approach to risk management not only by considering cybernetics from a cyber-attack point of view but also by considering the consequences of the use of corrupted data.;The first step of the methodology is to delimitate and define the system that the study should focus on as well as to define the term risk. By considering the risk as a function of hazards, the state of the system and its consequences, it is possible to define the scope of the study. As stated previously, the system studied is a CI. The vulnerability of the system depends on the state of the system itself, on the capacity of a hazard to affect this state and on the undesired consequences the combination of the hazard and the vulnerability will eventually lead to.;The second step is to characterize CIs in terms of their operations, their functions and the resources they use. The idea is to determine the importance of the functions in a context of operational continuity. For this, we rely on expert judgment in order to differentiate the functions that are critical to the good functioning infrastructure and the ones that are supportive. We also characterize how the deterioration of a function can affect the achievement of the mission of the CI.;The third step is to develop the concepts of a methodology for analyzing vulnerability. We here consider an approach based on the consequences (alteration of the mission), and toward the causes considering the variation of the system. For this, it is necessary to define the dependence of each function of the CIs towards the resources they use. We must therefore classify the resources according to their importance for the realization of the functions of the CIs and characterize the level of affectation of these functions whenever a resource is altered or unavailable. For this, we use the principles of endorsement.;The final step consists in looking more specifically the dependence of the CIs towards the use of cyber data. For this, we consider the data as a resource used by the CIs. The objective here is to define the possible states of the data. The criteria used are, among others, the modes of transmission of the data and the time taken to change state.;The principles and concepts developed during this research will complement the works currently done in the field of computer security. Indeed, this research considers cybernetics from a different perspective, the dependence of CIs towards data.
机译:关键基础架构(CI)是复杂的系统。对于它们的运营,这些基础架构越来越多地使用监督控制和数据采集(SCADA)系统。因此,管理实践高度依赖于网络工具,还取决于使这些工具正常工作所需的数据。因此,配置项很容易受到数据降级的影响。在这种情况下,本研究旨在开发一种分析配置项对使用网络数据的脆弱性的方法的基础。通过描述CI的网络脆弱性,不仅可以从网络攻击的角度考虑控制论,而且可以通过考虑使用CI的后果来提高这些网络的弹性,并采取主动的风险管理方法。损坏的数据。方法的第一步是界定和定义研究应关注的系统以及定义风险一词。通过将风险视为危害,系统状态及其后果的函数,可以定义研究范围。如前所述,研究的系统是CI。系统的脆弱性取决于系统本身的状态,危害影响该状态的能力以及危害和脆弱性的结合最终会导致的不良后果。第二步是表征配置项在操作,功能和使用资源方面。这个想法是在操作连续性的背景下确定功能的重要性。为此,我们依靠专家判断来区分对良好运行的基础架构至关重要的功能和对支持功能至关重要的功能。我们还描述了功能的恶化如何影响CI任务的实现。第三步是开发分析漏洞的方法论的概念。我们在这里考虑一种基于后果(任务变更)的方法,并考虑系统变化的原因。为此,有必要定义CI的每个功能对其使用的资源的依赖性。因此,我们必须根据资源对CI的功能实现的重要性对其进行分类,并且每当资源发生更改或不可用时,就要描述这些功能的影响程度。为此,我们使用背书原则。最后一步是更具体地研究CI对网络数据使用的依赖性。为此,我们将数据视为配置项使用的资源。此处的目的是定义数据的可能状态。使用的标准包括数据的传输模式和更改状态所花费的时间。在此研究中开发的原理和概念将补充计算机安全领域当前所做的工作。确实,这项研究从不同的角度考虑了控制论,即CI对数据的依赖性。

著录项

  • 作者

    Petit, Frederic.;

  • 作者单位

    Ecole Polytechnique, Montreal (Canada).;

  • 授予单位 Ecole Polytechnique, Montreal (Canada).;
  • 学科 Engineering Civil.;Artificial Intelligence.
  • 学位 Ph.D.
  • 年度 2009
  • 页码 267 p.
  • 总页数 267
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 建筑科学;人工智能理论;
  • 关键词

  • 入库时间 2022-08-17 11:37:37

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号