{"title":"基于随机博弈论的CSP脆弱性分析","authors":"Jiajun Shen, Dong-qin Feng","doi":"10.1155/2016/4147251","DOIUrl":null,"url":null,"abstract":"With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols ICPs, which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol CSP, one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle MIM attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.","PeriodicalId":46052,"journal":{"name":"Journal of Control Science and Engineering","volume":null,"pages":null},"PeriodicalIF":1.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Vulnerability Analysis of CSP Based on Stochastic Game Theory\",\"authors\":\"Jiajun Shen, Dong-qin Feng\",\"doi\":\"10.1155/2016/4147251\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols ICPs, which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol CSP, one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle MIM attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.\",\"PeriodicalId\":46052,\"journal\":{\"name\":\"Journal of Control Science and Engineering\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Control Science and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1155/2016/4147251\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Control Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1155/2016/4147251","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Vulnerability Analysis of CSP Based on Stochastic Game Theory
With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols ICPs, which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol CSP, one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle MIM attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.
期刊介绍:
Journal of Control Science and Engineering is a peer-reviewed, open access journal that publishes original research articles as well as review articles in all areas of control science and engineering.