IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Threat Attribution and Reasoning for Industrial Control System Asset

Threat Attribution and Reasoning for Industrial Control System Asset
View Sample PDF
Author(s): Shuqin Zhang (Zhongyuan University of Technology, China), Peiyu Shi (School of Computer Science, Zhongyuan University of Technology, China), Tianhui Du (Zhongyuan University of Technology, China), Xinyu Su (Zhongyuan University of Technology, China)and Yunfei Han (Zhongyuan University of Technology, China)
Copyright: 2024
Volume: 15
Issue: 1
Pages: 27
Source title: International Journal of Ambient Computing and Intelligence (IJACI)
Editor(s)-in-Chief: Nilanjan Dey (JIS University, Kolkata, India)
DOI: 10.4018/IJACI.333853

Purchase

View Threat Attribution and Reasoning for Industrial Control System Asset on the publisher's website for pricing and purchasing information.

Abstract

Due to the widespread use of the industrial internet of things, the industrial control system has steadily transformed into an intelligent and informational one. To increase the industrial control system's security, based on industrial control system assets, this paper provides a method of threat modeling, attributing, and reasoning. First, this method characterizes the asset threat of an industrial control system by constructing an asset security ontology based on the asset structure. Second, this approach makes use of machine learning to identify assets and attribute the attacker's attack path. Subsequently, inference rules are devised to replicate the attacker's attack path, thereby reducing the response time of security personnel to threats and strengthening the semantic relationship between asset security within industrial control systems. Finally, the process is used in the simulation environment and real case scenario based on the power grid, where the assets and attacks are mapped. The actual attack path is deduced, and it demonstrates the approach's effectiveness.

Related Content

Li Liao. © 2024. 16 pages.
Shuqin Zhang, Peiyu Shi, Tianhui Du, Xinyu Su, Yunfei Han. © 2024. 27 pages.
Jinming Zhou, Yuanyuan Zhan, Sibo Chen. © 2024. 29 pages.
G. Manikandan, Reuel Samuel Sam, Steven Frederick Gilbert, Karthik Srikanth. © 2024. 16 pages.
Liangqun Yang. © 2024. 17 pages.
V. Shanmugarajeshwari, M. Ilayaraja. © 2024. 22 pages.
Kaisheng Liu. © 2024. 21 pages.
Body Bottom