基于随机博弈论的CSP脆弱性分析

IF 1 Q4 AUTOMATION & CONTROL SYSTEMS
Jiajun Shen, Dong-qin Feng
{"title":"基于随机博弈论的CSP脆弱性分析","authors":"Jiajun Shen, Dong-qin Feng","doi":"10.1155/2016/4147251","DOIUrl":null,"url":null,"abstract":"With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols ICPs, which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol CSP, one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle MIM attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.","PeriodicalId":46052,"journal":{"name":"Journal of Control Science and Engineering","volume":null,"pages":null},"PeriodicalIF":1.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Vulnerability Analysis of CSP Based on Stochastic Game Theory\",\"authors\":\"Jiajun Shen, Dong-qin Feng\",\"doi\":\"10.1155/2016/4147251\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols ICPs, which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol CSP, one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle MIM attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.\",\"PeriodicalId\":46052,\"journal\":{\"name\":\"Journal of Control Science and Engineering\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Control Science and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1155/2016/4147251\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Control Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1155/2016/4147251","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 2

摘要

随着工业信息化的发展,工业控制网络越来越容易被攻击者所利用。因此会暴露出一系列的漏洞,特别是工业专用通信协议icp的漏洞,目前还没有得到足够的重视。本文将随机博弈论应用于时钟同步协议(CSP)的脆弱性分析。在考虑中间人MIM攻击和可靠性失效的情况下,严格按照协议建立随机博弈模型。在描述实际攻击场景时,考虑了多条攻击路由的情况,并引入时间方面表征了攻击者动作的成功概率。通过分别确定攻击者在系统不同状态下的最优策略,实现漏洞分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Vulnerability Analysis of CSP Based on Stochastic Game Theory
With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols ICPs, which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol CSP, one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle MIM attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Control Science and Engineering
Journal of Control Science and Engineering AUTOMATION & CONTROL SYSTEMS-
CiteScore
4.70
自引率
0.00%
发文量
54
审稿时长
19 weeks
期刊介绍: Journal of Control Science and Engineering is a peer-reviewed, open access journal that publishes original research articles as well as review articles in all areas of control science and engineering.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信