• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于分析和优化缓解对网络物理系统的网络威胁的贝叶斯框架。

A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems.

作者信息

Żebrowski Piotr, Couce-Vieira Aitor, Mancuso Alessandro

机构信息

International Institute for Applied Systems Analysis (IIASA), Laxenburg, Austria.

Instituto de Ciencias Matemáticas, Consejo Superior de Investigaciones Científicas, Madrid, Spain.

出版信息

Risk Anal. 2022 Oct;42(10):2275-2290. doi: 10.1111/risa.13900. Epub 2022 Mar 1.

DOI:10.1111/risa.13900
PMID:35229333
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9790388/
Abstract

Critical infrastructures are increasingly reliant on information and communications technology (ICT) for more efficient operations, which, at the same time, exposes them to cyber threats. As the frequency and severity of cyberattacks are increasing, so are the costs of critical infrastructure security. Efficient allocation of resources is thus a crucial issue for cybersecurity. A common practice in managing cyber threats is to conduct a qualitative analysis of individual attack scenarios through risk matrices, prioritizing the scenarios according to their perceived urgency and addressing them in order until all the resources available for cybersecurity are spent. Apart from methodological caveats, this approach may lead to suboptimal resource allocations, given that potential synergies between different attack scenarios and among available security measures are not taken into consideration. To overcome this shortcoming, we propose a quantitative framework that features: (1) a more holistic picture of the cybersecurity landscape, represented as a Bayesian network (BN) that encompasses multiple attack scenarios and thus allows for a better appreciation of vulnerabilities; and (2) a multiobjective optimization model built on top of the said BN that explicitly represents multiple dimensions of the potential impacts of successful cyberattacks. Our framework adopts a broader perspective than the standard cost-benefit analysis and allows the formulation of more nuanced security objectives. We also propose a computationally efficient algorithm that identifies the set of Pareto-optimal portfolios of security measures that simultaneously minimize various types of expected cyberattack impacts, while satisfying budgetary and other constraints. We illustrate our framework with a case study of electric power grids.

摘要

关键基础设施越来越依赖信息通信技术(ICT)以实现更高效的运营,而这同时也使它们面临网络威胁。随着网络攻击的频率和严重程度不断增加,关键基础设施安全的成本也在上升。因此,资源的有效分配是网络安全的一个关键问题。管理网络威胁的常见做法是通过风险矩阵对单个攻击场景进行定性分析,根据感知到的紧迫性对场景进行优先级排序,并依次处理,直到用于网络安全的所有可用资源耗尽。除了方法上的缺陷外,这种方法可能会导致资源分配次优,因为没有考虑不同攻击场景之间以及可用安全措施之间的潜在协同效应。为了克服这一缺点,我们提出了一个定量框架,其特点是:(1)对网络安全态势有更全面的了解,以贝叶斯网络(BN)表示,该网络包含多个攻击场景,从而能够更好地评估漏洞;(2)在上述贝叶斯网络之上构建的多目标优化模型,明确表示成功的网络攻击潜在影响的多个维度。我们的框架采用了比标准成本效益分析更广泛的视角,并允许制定更细致入微的安全目标。我们还提出了一种计算效率高的算法,该算法能够识别安全措施的帕累托最优组合集,这些组合在满足预算和其他约束的同时,能同时最小化各种类型的预期网络攻击影响。我们通过一个电网的案例研究来说明我们的框架。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/77ce017c1f98/RISA-42-2275-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/8d59df978433/RISA-42-2275-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/930bb9246de9/RISA-42-2275-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/22556e091114/RISA-42-2275-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/e9ffb732bc28/RISA-42-2275-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/2254a95b2d31/RISA-42-2275-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/f1552f91aa1e/RISA-42-2275-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/77ce017c1f98/RISA-42-2275-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/8d59df978433/RISA-42-2275-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/930bb9246de9/RISA-42-2275-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/22556e091114/RISA-42-2275-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/e9ffb732bc28/RISA-42-2275-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/2254a95b2d31/RISA-42-2275-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/f1552f91aa1e/RISA-42-2275-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a159/9790388/77ce017c1f98/RISA-42-2275-g004.jpg

相似文献

1
A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems.用于分析和优化缓解对网络物理系统的网络威胁的贝叶斯框架。
Risk Anal. 2022 Oct;42(10):2275-2290. doi: 10.1111/risa.13900. Epub 2022 Mar 1.
2
A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.复杂网络安全控制的最新进展与方法综述。
Sensors (Basel). 2023 Apr 15;23(8):4013. doi: 10.3390/s23084013.
3
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
4
Cybersecurity in Power Grids: Challenges and Opportunities.电网中的网络安全:挑战与机遇
Sensors (Basel). 2021 Sep 16;21(18):6225. doi: 10.3390/s21186225.
5
Potential smart grid vulnerabilities to cyber attacks: Current threats and existing mitigation strategies.智能电网对网络攻击的潜在脆弱性:当前威胁与现有缓解策略。
Heliyon. 2024 Sep 16;10(19):e37980. doi: 10.1016/j.heliyon.2024.e37980. eCollection 2024 Oct 15.
6
Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study.国家卫生系统中医院网络攻击的经济影响:描述性案例研究
JMIR Form Res. 2023 Jun 30;7:e41738. doi: 10.2196/41738.
7
Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.用于网络安全风险评估的恶意性特征描述与度量
Front Psychol. 2018 Feb 5;9:39. doi: 10.3389/fpsyg.2018.00039. eCollection 2018.
8
We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.我们需要瞄准高端:与网络和信息安全决策者的网络安全意识相关的因素。
PLoS One. 2024 Oct 18;19(10):e0312266. doi: 10.1371/journal.pone.0312266. eCollection 2024.
9
An Adversarial Risk Analysis Framework for Cybersecurity.一种用于网络安全的对抗风险分析框架。
Risk Anal. 2021 Jan;41(1):16-36. doi: 10.1111/risa.13331. Epub 2019 Jun 10.
10
Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations.预测工业 4.0 关键基础设施中的网络安全威胁:基于攻击者动机的主动方法。
Sensors (Basel). 2023 May 6;23(9):4539. doi: 10.3390/s23094539.

引用本文的文献

1
A hybrid approach combining Bayesian networks and logistic regression for enhancing risk assessment.一种结合贝叶斯网络和逻辑回归以加强风险评估的混合方法。
Sci Rep. 2025 Jul 23;15(1):26802. doi: 10.1038/s41598-025-10291-9.

本文引用的文献

1
An Adversarial Risk Analysis Framework for Cybersecurity.一种用于网络安全的对抗风险分析框架。
Risk Anal. 2021 Jan;41(1):16-36. doi: 10.1111/risa.13331. Epub 2019 Jun 10.
2
Security Events and Vulnerability Data for Cybersecurity Risk Estimation.用于网络安全风险评估的安全事件和漏洞数据。
Risk Anal. 2017 Aug;37(8):1606-1627. doi: 10.1111/risa.12864.
3
Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies.关键基础设施的网络风险管理:风险分析模型与三个案例研究。
Risk Anal. 2018 Feb;38(2):226-241. doi: 10.1111/risa.12844. Epub 2017 Jul 5.
4
Resilience of Cyber Systems with Over- and Underregulation.网络系统的过调节和欠调节弹性。
Risk Anal. 2017 Sep;37(9):1644-1651. doi: 10.1111/risa.12729. Epub 2016 Dec 9.
5
What's wrong with risk matrices?风险矩阵有什么问题?
Risk Anal. 2008 Apr;28(2):497-512. doi: 10.1111/j.1539-6924.2008.01030.x.
6
Fitting hierarchical holographic modeling into the theory of scenario structuring and a resulting refinement to the quantitative definition of risk.将分层全息建模融入情景构建理论,并由此对风险的定量定义进行完善。
Risk Anal. 2001 Oct;21(5):807-19. doi: 10.1111/0272-4332.215153.