Industrial control systems (ICS) are facing an increasing number of sophisticated and damaging multi-step attacks. The complexity of multi-step attacks makes it difficult for security protection personnel to effectively determine the target attack path. In addition, most of the current protection models responding to multi-step attacks have not deeply studied the protection strategy selection method in the case of limited budget. Aiming at the above problems, we propose a protection strategy selection model based on the Genetic Ant Colony Optimization Algorithm. The model firstly evaluates the risk of ICS through the Bayesian attack graph; next, the target attack path is predicted from multiple angles through the maximum probability attack ...
peer reviewedRisk treatment is an important part of risk management, and deals with the question whi...
Nowadays, Information and Communication Technology (ICT) infrastructures play a crucial role for hum...
This paper deals with computational aspects of attack trees, more precisely, evaluating the expected...
With the rapid development of Industrial Internet of Things technology, the industrial control syste...
This research is focused on using a highly detailed simulation model to create a physical security s...
Cyberattacks targeting modern network infrastructures are increasing in number and impact. This grow...
Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use ...
Ant colony Optimization is a nature-inspired meta-heuristic optimization algorithm that gained a gre...
With the rapid development of the Internet, network attacks often occur, and network security is wid...
Today, information systems are threatened not only by the opportunistic exploitation of particular t...
Protection against many cyber security threats can be implemented by existing software on the system...
Attack graphs are models that offer significant capabilities to analyse security in network systems....
The Merkle-Hellman (MH) cryptosystem is one of the earliest public key cryptosystems, which is intro...
Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use ...
This paper deals with computational aspects of attack trees, more precisely, evaluating the expected...
peer reviewedRisk treatment is an important part of risk management, and deals with the question whi...
Nowadays, Information and Communication Technology (ICT) infrastructures play a crucial role for hum...
This paper deals with computational aspects of attack trees, more precisely, evaluating the expected...
With the rapid development of Industrial Internet of Things technology, the industrial control syste...
This research is focused on using a highly detailed simulation model to create a physical security s...
Cyberattacks targeting modern network infrastructures are increasing in number and impact. This grow...
Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use ...
Ant colony Optimization is a nature-inspired meta-heuristic optimization algorithm that gained a gre...
With the rapid development of the Internet, network attacks often occur, and network security is wid...
Today, information systems are threatened not only by the opportunistic exploitation of particular t...
Protection against many cyber security threats can be implemented by existing software on the system...
Attack graphs are models that offer significant capabilities to analyse security in network systems....
The Merkle-Hellman (MH) cryptosystem is one of the earliest public key cryptosystems, which is intro...
Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use ...
This paper deals with computational aspects of attack trees, more precisely, evaluating the expected...
peer reviewedRisk treatment is an important part of risk management, and deals with the question whi...
Nowadays, Information and Communication Technology (ICT) infrastructures play a crucial role for hum...
This paper deals with computational aspects of attack trees, more precisely, evaluating the expected...