...
首页> 外文期刊>Journal of control science and engineering >Vulnerability Analysis of CSP Based on Stochastic Game Theory
【24h】

Vulnerability Analysis of CSP Based on Stochastic Game Theory

机译:基于随机博弈论的CSP漏洞分析

获取原文
   

获取外文期刊封面封底 >>

       

摘要

With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols (ICPs), which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol (CSP), one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle (MIM) attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.
机译:随着工业信息化的发展,工业控制网络已逐渐变得易于攻击者使用。因此,将暴露出一系列漏洞,尤其是专有工业通信协议(ICP)的漏洞,该漏洞尚未得到足够重视。本文将随机博弈理论应用于时钟同步协议(CSP)的关键ICP之一的脆弱性分析中。严格根据协议构建随机博弈模型,同时考虑中间人(MIM)攻击和可靠性故障。考虑多种攻击路径的情况来描述实际的攻击场景,并且时间方面的引入描述了攻击者行动成功的可能性。然后通过分别确定系统不同状态下攻击者的最佳策略来实现漏洞分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号