Power Internet Assets Security Threat Assessment based on the Cost of Security Protection

Wen Shen, Qian Guo, Pengfei Yu, Xu-Sheng Liu
{"title":"Power Internet Assets Security Threat Assessment based on the Cost of Security Protection","authors":"Wen Shen, Qian Guo, Pengfei Yu, Xu-Sheng Liu","doi":"10.1109/AEMCSE55572.2022.00042","DOIUrl":null,"url":null,"abstract":"In recent years, with the extensive access to many devices and users in the power Internet environment, network exposure has increased, bringing serious challenges to the protection system characterized by boundary isolation. To address the problem that existing threat assessment methods do not consider the cost of security protection measures on the operation of existing systems, this paper proposes a threat assessment method based on the cost of security protection based on a multi-factor combination weight analysis model. The method introduces threat protection economic factors and threat protection efficiency factors to implement comprehensive threat assessment. Starting from the three dimensions of single asset (device), layer (network) and scenario (application), the threat scope factor, threat frequency factor, threat protection economic factor and threat protection efficiency factor are taken as evaluation factors, and the combined weight calculation model is used to conduct comprehensive threat assessment and further calculate the eigenvalues of the risk distribution and derive the risk distribution results. The method quantitatively evaluates the benefits and drawbacks of security protection measures in terms of both the economic impact of cyber-attacks on the electricity business and the impact of the implementation of protection measures on the efficiency of business operations. Compared to existing threat assessments, it considers not only the degree of harm caused by the attack, but also the economic cost of security protection, thus effectively avoiding the problem of over-investment.","PeriodicalId":309096,"journal":{"name":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AEMCSE55572.2022.00042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In recent years, with the extensive access to many devices and users in the power Internet environment, network exposure has increased, bringing serious challenges to the protection system characterized by boundary isolation. To address the problem that existing threat assessment methods do not consider the cost of security protection measures on the operation of existing systems, this paper proposes a threat assessment method based on the cost of security protection based on a multi-factor combination weight analysis model. The method introduces threat protection economic factors and threat protection efficiency factors to implement comprehensive threat assessment. Starting from the three dimensions of single asset (device), layer (network) and scenario (application), the threat scope factor, threat frequency factor, threat protection economic factor and threat protection efficiency factor are taken as evaluation factors, and the combined weight calculation model is used to conduct comprehensive threat assessment and further calculate the eigenvalues of the risk distribution and derive the risk distribution results. The method quantitatively evaluates the benefits and drawbacks of security protection measures in terms of both the economic impact of cyber-attacks on the electricity business and the impact of the implementation of protection measures on the efficiency of business operations. Compared to existing threat assessments, it considers not only the degree of harm caused by the attack, but also the economic cost of security protection, thus effectively avoiding the problem of over-investment.
基于安全防护成本的电力互联网资产安全威胁评估
近年来,随着电力互联网环境中众多设备和用户的广泛接入,网络暴露度增加,给以边界隔离为特征的防护体系带来了严峻的挑战。针对现有威胁评估方法未考虑安全防护措施成本对现有系统运行影响的问题,本文提出了一种基于多因素组合权重分析模型的基于安全防护成本的威胁评估方法。该方法引入威胁防护经济因素和威胁防护效率因素,实现威胁综合评估。从单个资产(设备)、层(网络)和场景(应用)三个维度出发,以威胁范围因子、威胁频率因子、威胁防护经济性因子和威胁防护效率因子作为评价因子,采用组合权重计算模型进行综合威胁评估,并进一步计算风险分布特征值,得出风险分布结果。该方法从网络攻击对电力业务的经济影响和实施保护措施对业务运营效率的影响两方面定量评估安全保护措施的利弊。与现有的威胁评估相比,它不仅考虑了攻击造成的危害程度,还考虑了安全防护的经济成本,从而有效地避免了过度投资的问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信