Development of Methodological Foundations for Designing a Classifier of Threats to Cyber-physical Systems

O. Shmatko, S. Balakireva, A. Vlasov, N. Zagorodna, O. Korol, O. Milov, Oleksii Petrov, S. Pohasii, K. Rzayev, V. Khvostenko
{"title":"Development of Methodological Foundations for Designing a Classifier of Threats to Cyber-physical Systems","authors":"O. Shmatko, S. Balakireva, A. Vlasov, N. Zagorodna, O. Korol, O. Milov, Oleksii Petrov, S. Pohasii, K. Rzayev, V. Khvostenko","doi":"10.15587/1729-4061.2020.205702","DOIUrl":null,"url":null,"abstract":"The emergence of a full-scale quantum computer questions the stability of almost all symmetric and asymmetric cryptography algorithms. At the same time, the rapid growth of computing resources of IT and “G” technologies contributes to an increase in attacks on information and communication (ICS) and cyberphysical systems (CPS). These systems are the core of modern critical cybernetic information systems (CCIS). In such conditions, the primary task of maintaining the required level of security is the classification of modern threats that are integrated with social engineering methods and acquire signs of synergy and hybridity. The paper proposes a synergistic model of threats to ICS/CPS, which takes into account the focus of threats on synergy and hybridity, and the combined impact of security components: information security (IS), cybersecurity (CS), security of information (SI). This approach allows developing methodological foundations for building a unified classifier of threats to cyberphysical systems, forming sets of critical threats, critical points in the ICS/CPS infrastructure elements, based on minimal computing, human and economic costs. The developed methodology for determining the category of an attacker allows systematizing an attacker and, based on the analysis of weighting factors, forming a matrix of correspondence between the capabilities of attackers of various categories and technical means of information security (TMIS). These actions significantly reduce the risk of an attack by certain categories of attackers and allow for planning in the formation of both the IS policy and the corresponding protection profiles.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CompSciRN: Other Cybersecurity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15587/1729-4061.2020.205702","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

The emergence of a full-scale quantum computer questions the stability of almost all symmetric and asymmetric cryptography algorithms. At the same time, the rapid growth of computing resources of IT and “G” technologies contributes to an increase in attacks on information and communication (ICS) and cyberphysical systems (CPS). These systems are the core of modern critical cybernetic information systems (CCIS). In such conditions, the primary task of maintaining the required level of security is the classification of modern threats that are integrated with social engineering methods and acquire signs of synergy and hybridity. The paper proposes a synergistic model of threats to ICS/CPS, which takes into account the focus of threats on synergy and hybridity, and the combined impact of security components: information security (IS), cybersecurity (CS), security of information (SI). This approach allows developing methodological foundations for building a unified classifier of threats to cyberphysical systems, forming sets of critical threats, critical points in the ICS/CPS infrastructure elements, based on minimal computing, human and economic costs. The developed methodology for determining the category of an attacker allows systematizing an attacker and, based on the analysis of weighting factors, forming a matrix of correspondence between the capabilities of attackers of various categories and technical means of information security (TMIS). These actions significantly reduce the risk of an attack by certain categories of attackers and allow for planning in the formation of both the IS policy and the corresponding protection profiles.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络物理系统威胁分类器设计方法基础的发展
全尺寸量子计算机的出现对几乎所有对称和非对称密码算法的稳定性提出了质疑。与此同时,随着IT和G技术计算资源的快速增长,针对信息通信系统和网络物理系统的攻击也在增加。这些系统是现代关键控制论信息系统(CCIS)的核心。在这种情况下,维持所需安全级别的主要任务是对现代威胁进行分类,这些威胁与社会工程方法相结合,并获得协同和混合的迹象。本文提出了ICS/CPS威胁的协同模型,该模型考虑了威胁对协同性和混合性的关注,以及安全组件的综合影响:信息安全(IS),网络安全(CS),信息安全(SI)。这种方法允许开发方法基础,以建立对网络物理系统的统一威胁分类器,形成关键威胁集,ICS/CPS基础设施要素中的关键点,基于最小的计算,人力和经济成本。所开发的确定攻击者类别的方法允许将攻击者系统化,并基于对加权因素的分析,形成不同类别攻击者能力与信息安全技术手段(TMIS)之间的对应矩阵。这些操作显著降低了某些类别攻击者的攻击风险,并允许在形成IS策略和相应的保护配置文件时进行规划。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Blockchain Technology and Intellectual Property – A Basic Introduction Endogenous Data Collection in Platform Markets: Privacy and Welfare Beyond Bitcoin: The Economics of Cryptocurrencies and Blockchain Technologies (Chapter 6: Smart Contracts and Blockchain) Privacy by Default, Abuse by Design: EU Competition Concerns About Apple's New App Tracking Policy Cryptocurrency & Its Impact on Environment
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1