Evaluating attractiveness of cyberattack path using resistance concept and page-rank algorithm

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 366
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorChae, Young Hoko
dc.contributor.authorLee, Chanyoungko
dc.contributor.authorChoi, Moon Kyoungko
dc.contributor.authorSeong, Poong Hyunko
dc.date.accessioned2021-10-31T06:40:11Z-
dc.date.available2021-10-31T06:40:11Z-
dc.date.created2021-10-31-
dc.date.created2021-10-31-
dc.date.created2021-10-31-
dc.date.issued2022-02-
dc.identifier.citationANNALS OF NUCLEAR ENERGY, v.166-
dc.identifier.issn0306-4549-
dc.identifier.urihttp://hdl.handle.net/10203/288447-
dc.description.abstractThe industrial control systems (ICSs) and instrumentation and control (I&C) systems of nuclear power plants (NPPs) have changed from analog systems to digital systems. Digital systems offer maintenance and usability advantages, but are prone to cyberattacks. The conventional belief that digital systems are essentially free from cyberattacks owing to the presence of air gaps has been negated by several attacks on actual NPPs. Theoretically, a system can be secured by using all possible security measures. However, in reality, the resources available for cybersecurity are limited. Therefore, the efficient distribution of resources is a critical issue. The conventional methods were mainly focused on impairment failure. In this study, we propose a system that suggests the most attractive attack path that can consider both type 1 (impairment failure) and type 2 (Byzantine failure) security failure. The proposed algorithm consists of two parts: a graph map that evaluates the attractiveness of an attack path, and a path-finding part that searches for the shortest path in the graph map. To quantify the attractiveness of the attack path, we propose a resistance concept. In addition, we quantify the importance of components in the system using a page-rank algorithm. We adopt Dijkstra's algorithm to automatically determine the most attractive path. With the proposed methodology, it is expected that an attractive attack path that considers both type 1 and type 2 security failure can be found, and a corresponding efficient cybersecurity strategy can be established. (c) 2021 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.publisherPERGAMON-ELSEVIER SCIENCE LTD-
dc.titleEvaluating attractiveness of cyberattack path using resistance concept and page-rank algorithm-
dc.typeArticle-
dc.identifier.wosid000707749900002-
dc.identifier.scopusid2-s2.0-85116879448-
dc.type.rimsART-
dc.citation.volume166-
dc.citation.publicationnameANNALS OF NUCLEAR ENERGY-
dc.identifier.doi10.1016/j.anucene.2021.108748-
dc.contributor.localauthorSeong, Poong Hyun-
dc.contributor.nonIdAuthorChoi, Moon Kyoung-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorCybersecurity-
dc.subject.keywordAuthorInstrumentation and control system-
dc.subject.keywordAuthorResistance-
dc.subject.keywordAuthorPage-rank algorithm-
dc.subject.keywordAuthorDijkstra&apos-
dc.subject.keywordAuthors algorithm-
dc.subject.keywordPlusC SYSTEMS-
Appears in Collection
NE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0