• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于模糊理论应用的矿山不同自动化水平采矿过程的网络攻击风险分析方法。

Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use.

机构信息

Faculty of Mechanical Engineering, Wroclaw University of Science and Technology, Wyspianskiego 27, 50-370 Wroclaw, Poland.

Faculty of GeoEngineering Mining and Geology, Wroclaw University of Science and Technology, Wyspianskiego 27, 50-370 Wroclaw, Poland.

出版信息

Sensors (Basel). 2020 Dec 16;20(24):7210. doi: 10.3390/s20247210.

DOI:10.3390/s20247210
PMID:33339301
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7766562/
Abstract

The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan's and Garrick's approach and fuzzy theory. The proposed approach takes into account the level of automation of the operating mining processes. Moreover, it follows five main steps, including identifying the automation level in a selected mine, definition of cyber-attack targets, identification of cyber-attack techniques, definition of cyber-attack consequences, and risk ratio assessment. The proposed risk assessment procedure was performed according to three cyber-attack targets (databases, internal networks, machinery) and seven selected types of cyber-attack techniques. The fuzzy theory is implemented in risk parameter estimation for cyber-attack scenario occurrence in the mining industry. To illustrate the given method's applicability, seven scenarios for three levels of mine automation are analyzed. The proposed method may be used to reveal the current cybersecurity status of the mine. Moreover, it will be a valuable guide for mines in which automation is planned in the near future.

摘要

矿业领域自动化水平的提高和工业 4.0 概念的发展增加了网络攻击的风险。因此,本文专注于开发一种风险分析方法,该方法结合了 Kaplan 和 Garrick 的方法和模糊理论。所提出的方法考虑了作业采矿过程的自动化水平。此外,它遵循五个主要步骤,包括确定选定矿山的自动化水平、定义网络攻击目标、识别网络攻击技术、定义网络攻击后果以及风险比评估。根据三种网络攻击目标(数据库、内部网络、机械)和七种选定的网络攻击技术,执行了所提出的风险评估程序。模糊理论用于估计采矿行业网络攻击场景发生的风险参数。为了说明给定方法的适用性,分析了三个自动化级别下的七个场景。该方法可用于揭示矿山当前的网络安全状况。此外,它将是未来计划在自动化方面进行投资的矿山的宝贵指南。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/44b61d5d48fb/sensors-20-07210-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/3dbae66f1c8a/sensors-20-07210-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/934a4f516c85/sensors-20-07210-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/3d6666b3748e/sensors-20-07210-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/92b7361c700a/sensors-20-07210-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/c506df45168f/sensors-20-07210-g005a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/b538ddc01496/sensors-20-07210-g006a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/44b61d5d48fb/sensors-20-07210-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/3dbae66f1c8a/sensors-20-07210-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/934a4f516c85/sensors-20-07210-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/3d6666b3748e/sensors-20-07210-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/92b7361c700a/sensors-20-07210-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/c506df45168f/sensors-20-07210-g005a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/b538ddc01496/sensors-20-07210-g006a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0581/7766562/44b61d5d48fb/sensors-20-07210-g007.jpg

相似文献

1
Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use.基于模糊理论应用的矿山不同自动化水平采矿过程的网络攻击风险分析方法。
Sensors (Basel). 2020 Dec 16;20(24):7210. doi: 10.3390/s20247210.
2
Fuzzy Risk-Based Maintenance Strategy with Safety Considerations for the Mining Industry.考虑安全因素的矿山模糊风险型维修策略。
Sensors (Basel). 2022 Jan 7;22(2):441. doi: 10.3390/s22020441.
3
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
4
Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways.基于 IEC 61850 的变电站自动化系统的拒绝服务攻击:智能变电站路径的关键网络威胁
Sensors (Basel). 2021 Sep 26;21(19):6415. doi: 10.3390/s21196415.
5
Controller Cyber-Attack Detection and Isolation.控制器网络攻击检测与隔离。
Sensors (Basel). 2023 Mar 3;23(5):2778. doi: 10.3390/s23052778.
6
A deeper look into cybersecurity issues in the wake of Covid-19: A survey.新冠疫情后对网络安全问题的深入研究:一项调查。
J King Saud Univ Comput Inf Sci. 2022 Nov;34(10):8176-8206. doi: 10.1016/j.jksuci.2022.08.003. Epub 2022 Aug 11.
7
Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.下一代汽车中的网络攻击、缓解技术、预期就绪情况和未来方向。
Accid Anal Prev. 2020 Dec;148:105837. doi: 10.1016/j.aap.2020.105837. Epub 2020 Oct 26.
8
Cyber-attack method and perpetrator prediction using machine learning algorithms.使用机器学习算法进行网络攻击方法及作案者预测
PeerJ Comput Sci. 2021 Apr 9;7:e475. doi: 10.7717/peerj-cs.475. eCollection 2021.
9
ExtHT: A hybrid tracing method for cyber-attacks in power industrial control systems.ExtHT:一种用于电力工业控制系统中网络攻击的混合追踪方法。
ISA Trans. 2023 May;136:1-15. doi: 10.1016/j.isatra.2022.10.024. Epub 2022 Oct 29.
10
Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.用于网络安全风险评估的恶意性特征描述与度量
Front Psychol. 2018 Feb 5;9:39. doi: 10.3389/fpsyg.2018.00039. eCollection 2018.

引用本文的文献

1
Integrating the IoT and Blockchain Technology for the Next Generation of Mining Inspection Systems.将物联网和区块链技术集成到下一代采矿检测系统中。
Sensors (Basel). 2022 Jan 25;22(3):899. doi: 10.3390/s22030899.
2
Risk Assessment for the Use of Drones in Warehouse Operations in the First Phase of Introducing the Service to the Market.在将服务推向市场的第一阶段,对仓库作业中使用无人机的风险评估。
Sensors (Basel). 2021 Oct 9;21(20):6713. doi: 10.3390/s21206713.

本文引用的文献

1
Sensitivity Analysis of Selected Parameters in the Order Picking Process Simulation Model, with Randomly Generated Orders.订单拣选过程仿真模型中选定参数的敏感性分析,采用随机生成订单的方式。
Entropy (Basel). 2020 Apr 9;22(4):423. doi: 10.3390/e22040423.
2
Pythagorean fuzzy VIKOR-based approach for safety risk assessment in mine industry.基于 Pythagorean 模糊 VIKOR 的矿业安全风险评估方法。
J Safety Res. 2019 Jun;69:135-153. doi: 10.1016/j.jsr.2019.03.005. Epub 2019 Mar 19.
3
Fuzzy risk assessment for mechanized underground coal mines in Turkey.
土耳其机械化地下煤矿的模糊风险评估。
Int J Occup Saf Ergon. 2020 Jun;26(2):256-271. doi: 10.1080/10803548.2018.1426804. Epub 2018 Apr 11.
4
A novel method of fuzzy fault tree analysis combined with VB program to identify and assess the risk of coal dust explosions.一种结合VB程序的模糊故障树分析新方法,用于识别和评估煤尘爆炸风险。
PLoS One. 2017 Aug 9;12(8):e0182453. doi: 10.1371/journal.pone.0182453. eCollection 2017.
5
Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.网络安全:对面临网络攻击风险的组织在信息共享与数据敏感性问题方面的批判性审视。
J Bus Contin Emer Plan. 2013;7(2):103-11.
6
Cyber security risk assessment for SCADA and DCS networks.针对SCADA和DCS网络的网络安全风险评估
ISA Trans. 2007 Oct;46(4):583-94. doi: 10.1016/j.isatra.2007.04.003. Epub 2007 Jul 10.
7
Fitting hierarchical holographic modeling into the theory of scenario structuring and a resulting refinement to the quantitative definition of risk.将分层全息建模融入情景构建理论,并由此对风险的定量定义进行完善。
Risk Anal. 2001 Oct;21(5):807-19. doi: 10.1111/0272-4332.215153.