DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chae, Young Ho | ko |
dc.contributor.author | Lee, Chanyoung | ko |
dc.contributor.author | Choi, Moon Kyoung | ko |
dc.contributor.author | Seong, Poong Hyun | ko |
dc.date.accessioned | 2021-10-31T06:40:11Z | - |
dc.date.available | 2021-10-31T06:40:11Z | - |
dc.date.created | 2021-10-31 | - |
dc.date.created | 2021-10-31 | - |
dc.date.created | 2021-10-31 | - |
dc.date.issued | 2022-02 | - |
dc.identifier.citation | ANNALS OF NUCLEAR ENERGY, v.166 | - |
dc.identifier.issn | 0306-4549 | - |
dc.identifier.uri | http://hdl.handle.net/10203/288447 | - |
dc.description.abstract | The industrial control systems (ICSs) and instrumentation and control (I&C) systems of nuclear power plants (NPPs) have changed from analog systems to digital systems. Digital systems offer maintenance and usability advantages, but are prone to cyberattacks. The conventional belief that digital systems are essentially free from cyberattacks owing to the presence of air gaps has been negated by several attacks on actual NPPs. Theoretically, a system can be secured by using all possible security measures. However, in reality, the resources available for cybersecurity are limited. Therefore, the efficient distribution of resources is a critical issue. The conventional methods were mainly focused on impairment failure. In this study, we propose a system that suggests the most attractive attack path that can consider both type 1 (impairment failure) and type 2 (Byzantine failure) security failure. The proposed algorithm consists of two parts: a graph map that evaluates the attractiveness of an attack path, and a path-finding part that searches for the shortest path in the graph map. To quantify the attractiveness of the attack path, we propose a resistance concept. In addition, we quantify the importance of components in the system using a page-rank algorithm. We adopt Dijkstra's algorithm to automatically determine the most attractive path. With the proposed methodology, it is expected that an attractive attack path that considers both type 1 and type 2 security failure can be found, and a corresponding efficient cybersecurity strategy can be established. (c) 2021 Elsevier Ltd. All rights reserved. | - |
dc.language | English | - |
dc.publisher | PERGAMON-ELSEVIER SCIENCE LTD | - |
dc.title | Evaluating attractiveness of cyberattack path using resistance concept and page-rank algorithm | - |
dc.type | Article | - |
dc.identifier.wosid | 000707749900002 | - |
dc.identifier.scopusid | 2-s2.0-85116879448 | - |
dc.type.rims | ART | - |
dc.citation.volume | 166 | - |
dc.citation.publicationname | ANNALS OF NUCLEAR ENERGY | - |
dc.identifier.doi | 10.1016/j.anucene.2021.108748 | - |
dc.contributor.localauthor | Seong, Poong Hyun | - |
dc.contributor.nonIdAuthor | Choi, Moon Kyoung | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Cybersecurity | - |
dc.subject.keywordAuthor | Instrumentation and control system | - |
dc.subject.keywordAuthor | Resistance | - |
dc.subject.keywordAuthor | Page-rank algorithm | - |
dc.subject.keywordAuthor | Dijkstra&apos | - |
dc.subject.keywordAuthor | s algorithm | - |
dc.subject.keywordPlus | C SYSTEMS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.