Vulnerability analysis of CSP based on stochastic game theory (Q1788526)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Vulnerability analysis of CSP based on stochastic game theory |
scientific article; zbMATH DE number 6948720
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Vulnerability analysis of CSP based on stochastic game theory |
scientific article; zbMATH DE number 6948720 |
Statements
Vulnerability analysis of CSP based on stochastic game theory (English)
0 references
8 October 2018
0 references
Summary: With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive Industrial Communication Protocols (ICPs), which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of Clock Synchronization Protocol (CSP), one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-In-the-Middle (MIM) attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.
0 references
industrial control network
0 references
clock synchronization protocol
0 references
stochastic game
0 references
0.8733408
0 references
0.85156864
0 references
0.83773357
0 references
0.83597755
0 references
0.8342974
0 references
0.82868826
0 references