Skip to main content

Research on ICS Intrusion Success Rate Algorithm Based on Attack and Defense Countermeasures

  • Conference paper
  • First Online:
Geo-informatics in Sustainable Ecosystem and Society (GSES 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 980))

  • 844 Accesses

Abstract

According to the existing ICS, the research on ICS intrusion success rate algorithm does not consider the deficiency. In this paper, it proposes an ICS intrusion success rate algorithm based on ADT model. Firstly,according to common attack attributes to build a complete index system, and introduce attack part of ADT model to get the success rate of invasion of each path. Secondly, introducing the intrusion alarm rate to achieve passive defense, and using active scanning’s method to achieve active defense. Finally, combined with the above research, the final success rate of invasion is obtained. And a case study is carried out what is based on ICS of a chemical enterprise. This method reduces the success rate of invasion of the optimal attack path by 27%. And it improves the accuracy of the traditional model evaluation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jiang, W., Fang, B.X., Tian, Z.H.: Network security measurement and optimal active defense based on offense and defense game model. J. Comput. 32(04), 817–827 (2009)

    Google Scholar 

  2. Peng, Y., Jiang, C.Q., Xie, F.: Research progress of information security in industrial control system. J. Tsinghua Univ. (Nat. Sci.) 52(10), 1396–1408 (2012)

    Google Scholar 

  3. Ru, Y., Wang, Y., Li, J.: Risk assessment of cyber attacks in ECPS based on attack tree and AHP. In: 2016 12th International Conference Natural Computation, Fuzzy Systems and Knowledge Discovery, pp. 465–470. IEEE, USA (2016)

    Google Scholar 

  4. Chen, Y., Hong, J., Liu, C.C.: Modeling of Intrusion and defense for assessment of cyber security at power substations. IEEE Trans. Smart Grid 9(4), 2541–2552 (2016)

    Article  Google Scholar 

  5. Arghavani, A., Arghavani, M., Ahmadi, M.: Attacker-manager game tree (AMGT): a new framework for visualizing and analysing the interactions between attacker and network security manager. Comput. Netw. 133, 42–58 (2018)

    Article  Google Scholar 

  6. Kordy, B., Pietre, L., Schweitzer, P.: DAG-based attack and defense modeling: don’t miss the forest for the attack trees. Comput. Sci. Rev. 13, 1–38 (2014)

    Article  Google Scholar 

  7. Cherdantseva, Y., Bumap, P., Blyth, A.: A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56, 1–27 (2016)

    Article  Google Scholar 

  8. Huang, J.H., Feng, D.Q., Wang, H.J.: Quantification method of industrial control system vulnerability based on attack graph. Autom. J. 42(05), 792–798 (2016)

    Google Scholar 

  9. GB/T 33009.3-2016, Industrial automation and control systems network security distributed control system (DCS) part 3: evaluation guide

    Google Scholar 

  10. Okil, C., Pawlowski, S.D.: The delphi method as a research tool: an example, design considerations and applications. Inf. Manage. 42(1), 15–29 (2004)

    Article  Google Scholar 

  11. Liu, F.F.: Process industrial data analytics for alarm analysis. Beijing University of Chemical Technology, pp. 1–77 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wending Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, W., Wu, K. (2019). Research on ICS Intrusion Success Rate Algorithm Based on Attack and Defense Countermeasures. In: Xie, Y., Zhang, A., Liu, H., Feng, L. (eds) Geo-informatics in Sustainable Ecosystem and Society. GSES 2018. Communications in Computer and Information Science, vol 980. Springer, Singapore. https://doi.org/10.1007/978-981-13-7025-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7025-0_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7024-3

  • Online ISBN: 978-981-13-7025-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics