• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

网络风险传播与复杂网络物理系统的网络安全控制的最优选择

Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems.

机构信息

Department of Information Security and Communication Technology, Norwegian University of Science and Technology, N-2815 Gjøvik, Norway.

出版信息

Sensors (Basel). 2021 Mar 1;21(5):1691. doi: 10.3390/s21051691.

DOI:10.3390/s21051691
PMID:33804503
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7957698/
Abstract

The increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other to form systems-of-systems. This interconnection enables the offering of functionality beyond the combined offering of each individual component, but at the same time increases the cyber risk of the overall system, as such risk propagates between and aggregates at component systems. The complexity of the resulting systems-of-systems in many cases leads to difficulty in analyzing cyber risk. Additionally, the selection of cybersecurity controls that will effectively and efficiently treat the cyber risk is commonly performed manually, or at best with limited automated decision support. In this work, we propose a method for analyzing risk propagation and aggregation in complex CPSs utilizing the results of risk assessments of their individual constituents. Additionally, we propose a method employing evolutionary programming for automating the selection of an optimal set of cybersecurity controls out of a list of available controls, that will minimize the residual risk and the cost associated with the implementation of these measures. We illustrate the workings of the proposed methods by applying them to the navigational systems of two variants of the Cyber-Enabled Ship (C-ES), namely the autonomous ship and the remotely controlled ship. The results are sets of cybersecurity controls applied to those components of the overall system that have been identified in previous studies as the most vulnerable ones; such controls minimize the residual risk, while also minimizing the cost of implementation.

摘要

信息技术与运营技术的日益融合导致了网络物理系统(CPSs)的形成,这些系统交织着物理和网络组件,并相互连接形成系统的系统。这种互联使系统能够提供超越每个单独组件组合提供的功能,但同时也增加了整个系统的网络风险,因为这种风险在组件系统之间传播和聚合。在许多情况下,由此产生的系统的复杂性导致分析网络风险变得困难。此外,选择将有效和高效地处理网络风险的网络安全控制通常是手动执行的,或者最多只能使用有限的自动化决策支持。在这项工作中,我们提出了一种利用其各个组成部分的风险评估结果来分析复杂 CPS 中的风险传播和聚合的方法。此外,我们还提出了一种利用进化编程的方法,用于从可用的控制列表中自动选择一组最佳的网络安全控制,以最小化剩余风险和与这些措施的实施相关的成本。我们通过将这些方法应用于两种网络增强型船舶(C-ES)变体的导航系统来演示所提出方法的工作原理,即自主船舶和远程控制船舶。结果是应用于整体系统中那些在前一研究中被确定为最脆弱的组件的网络安全控制;这些控制措施将残余风险降至最低,同时也将实施成本降至最低。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/954757d4908e/sensors-21-01691-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/44fa1c0cdffd/sensors-21-01691-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/b0aec866c000/sensors-21-01691-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/2bb64954e211/sensors-21-01691-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/d684895b450c/sensors-21-01691-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/9722292006b1/sensors-21-01691-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/bdecf2219b89/sensors-21-01691-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/954757d4908e/sensors-21-01691-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/44fa1c0cdffd/sensors-21-01691-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/b0aec866c000/sensors-21-01691-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/2bb64954e211/sensors-21-01691-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/d684895b450c/sensors-21-01691-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/9722292006b1/sensors-21-01691-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/bdecf2219b89/sensors-21-01691-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/535e/7957698/954757d4908e/sensors-21-01691-g007.jpg

相似文献

1
Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems.网络风险传播与复杂网络物理系统的网络安全控制的最优选择
Sensors (Basel). 2021 Mar 1;21(5):1691. doi: 10.3390/s21051691.
2
Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.通过工作域分析检查关键基础设施的网络物理系统的网络安全。
Hum Factors. 2018 Aug;60(5):699-718. doi: 10.1177/0018720818769250. Epub 2018 Apr 17.
3
Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.网络卫生方法在提高医疗机构网络安全和数据隐私意识中的应用:概念研究。
J Med Internet Res. 2023 Jul 27;25:e41294. doi: 10.2196/41294.
4
Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.用于网络安全风险评估的恶意性特征描述与度量
Front Psychol. 2018 Feb 5;9:39. doi: 10.3389/fpsyg.2018.00039. eCollection 2018.
5
Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems.识别和分析复杂的网络物理系统中的依赖关系。
Sensors (Basel). 2021 Mar 1;21(5):1685. doi: 10.3390/s21051685.
6
Cyberbiosecurity in high-containment laboratories.高防护实验室中的网络生物安全
Front Bioeng Biotechnol. 2023 Jul 25;11:1240281. doi: 10.3389/fbioe.2023.1240281. eCollection 2023.
7
Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.下一代汽车中的网络攻击、缓解技术、预期就绪情况和未来方向。
Accid Anal Prev. 2020 Dec;148:105837. doi: 10.1016/j.aap.2020.105837. Epub 2020 Oct 26.
8
Design and Development Considerations of a Cyber Physical Testbed for Operational Technology Research and Education.用于运营技术研究与教育的网络物理测试平台的设计与开发考量
Sensors (Basel). 2024 Jun 17;24(12):3923. doi: 10.3390/s24123923.
9
A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles.面向车联网和自动驾驶汽车网络安全评估的概念系统动力学模型。
Accid Anal Prev. 2022 Feb;165:106515. doi: 10.1016/j.aap.2021.106515. Epub 2021 Dec 8.
10
Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.智慧机场网络安全:威胁缓解与网络弹性控制。
Sensors (Basel). 2018 Dec 21;19(1):19. doi: 10.3390/s19010019.