Development of a quantitative method for evaluating the efficacy of cyber security controls in NPPs based on intrusion tolerance concpet침입 내성 개념을 이용한 원자력 발전소 내 사이버 보안조치 효과의 정량적 평가 방법론 개발

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 427
  • Download : 0
Although many regulatory documents, guides, and standards have been published in the nuclear industry, there are still difficulties when it comes to deciding which security controls are needed and to defining appropriate security control requirements [11]. To evaluate the efficacy of security controls, this study has developed a measure of ‘cyber security improvement’. The ‘cyber security improvement’ is defined as the reduction ratio of the probability that a cyber attack will damage the target system. In addition, the concept of ‘intrusion tolerance system’ is applied to the measure of ‘cyber security improvement’ for ensuring the capability to protect, detect, respond and recover from cyber attacks. To estimate the ratio of the failure probability of the resistance strategy between a baseline system and an enhanced system, the concept of ‘mean time to compromise’ is adopted, and the adopted model is revised in accordance with the method. The validity of the suggested method is proven by conducting a case study. The suggested method can help assess how much system security can be improved by specific cyber security controls and which types of additional cyber security controls should be taken. However, this work has some limitations in estimating the efficacy of cyber security controls. The methods for obtaining the probabilities of detection strategy and the mitigation strategy need to be elaborated. Also, the verification and validation of the suggested method need to be improved.
Advisors
Seong, Poong Hyunresearcher성풍현researcher
Description
한국과학기술원 :원자력및양자공학과,
Publisher
한국과학기술원
Issue Date
2017
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 원자력및양자공학과, 2017.2,[v,55 p. :]

Keywords

Cyber Security Control; Cyber Security Improvement; Intrusion Tolerance System; Resistance Strategy; Detection Strategy; Mitigation Strategy; Mean Time to Compromise; 사이버 보안 조치; 사이버 보안 향상도; 친입 내성 시스템; 방어전략; 탐지전략; 완화전략; 공격에 필요한 평균시간

URI
http://hdl.handle.net/10203/243196
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=675325&flag=dissertation
Appears in Collection
NE-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0