Vulnerability Assessment of WAMS Communication System in the Energy Internet Based on Attack Tree Model

Author(s):  
Zhang Kai-lun ◽  
Tang Quan ◽  
Zhang Hong-gang
Author(s):  
Meriem Houmer ◽  
Moulay Lahcen Hasnaoui

The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Researchers and interested authorities have therefore paid more attention to this issue. Therefore, robust approaches to protect this network's security and privacy against adversaries and attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to improve the security of VANET, it is necessary to carry out a risk assessment, in order to evaluate the risk that faces this network. This paper focuses on the security threats in vehicular network especially on the availability of this network. We propose a novel risk assessment approach to evaluate the risk of the attack that the attacker can lead against the availability of VANET. We adopt a tree structure called attack tree to model the attacker's potential attack strategies. Based on this attack tree model, we can estimate the degree that a certain threat can lead to the VANET and identify possible attack sequences that an attacker may launch against the availability of this network. Then we utilize the multi-attribute utility theory to calculate the system’s total risk value also the probabilities of each attack sequence. The analysis results can provide support for decision-makers to make corresponding protection measures against the attack on the availability of this network.


Author(s):  
Ronierison Maciel ◽  
Jean Araujo ◽  
Jamilson Dantas ◽  
Carlos Melo ◽  
Erico Guedes ◽  
...  

2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Wenli Shang ◽  
Tianyu Gong ◽  
Chunyu Chen ◽  
Jing Hou ◽  
Peng Zeng

Information security risk assessment for industrial control system is usually influenced by uncertain factors. For effectively dealing with problem that the uncertainty and quantification difficulties are caused by subjective and objective factors in the assessment process, an information security risk assessment method based on attack tree model with fuzzy set theory and probability risk assessment technology is proposed, which is applied in a risk scenario of ship control system. Firstly, potential risks of the control system are analyzed and the attack tree model is established. Then triangular fuzzy numbers and expert knowledge are used to determine the factors that influence the probability of a leaf node and the leaf nodes are quantified to obtain the interval probability. Finally, the fuzzy arithmetic is used to determine the interval probability of the root node and the attack path. After defuzzification, the potential risks of the system and the probability of occurrence of each attack path are obtained. Compared with other methods, the proposed method can greatly reduce the impact of subjectivity on the risk assessment of industrial control systems and get more stable, reliable, and scientific evaluation results.


Sign in / Sign up

Export Citation Format

Share Document