{"title":"Mathematical modeling of information security threats of automated process control systems","authors":"D. Chernov, A. Sychugov","doi":"10.1109/ICOECS46375.2019.8950023","DOIUrl":null,"url":null,"abstract":"Analysis of the process of modeling threats to information security of automated process control systems was carried out. Basic principles of security threats model formation are considered. The approach to protection of automated process control systems based on Shtakelberg game in a strategic form has been modeled. An abstract mathematical model of information security threats to automated process control systems has been developed. A formalized representation of a threat model is described, taking into account an intruder's potential. Presentation of the process of applying the described threat model in the form of a continuous Deming-Shewhart cycle is proposed.","PeriodicalId":371743,"journal":{"name":"2019 International Conference on Electrotechnical Complexes and Systems (ICOECS)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Electrotechnical Complexes and Systems (ICOECS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOECS46375.2019.8950023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Analysis of the process of modeling threats to information security of automated process control systems was carried out. Basic principles of security threats model formation are considered. The approach to protection of automated process control systems based on Shtakelberg game in a strategic form has been modeled. An abstract mathematical model of information security threats to automated process control systems has been developed. A formalized representation of a threat model is described, taking into account an intruder's potential. Presentation of the process of applying the described threat model in the form of a continuous Deming-Shewhart cycle is proposed.