Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2020, Issue 19, volume 3, Pages 621–643
DOI: https://doi.org/10.15622/sp.2020.19.3.6
(Mi trspy1111)
 

This article is cited in 1 scientific paper (total in 1 paper)

Information Security

Complex of models for network security assessment of industrial automated control systems

R. Fatkieva

St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences (SPIIRAS)
Abstract: The modern enterprises apply network technologies to their automated industrial control systems. Along with advantages of the above approach the risk of network attacks on automated control systems increases significantly. Hence there is an urgent need to develop automated monitoring means being capable of unauthorized access detection and of an adequate response to it. The enterprise security system should take into account components interaction and involve the ability of self-renewal throughout the entire life cycle.
The partial models of functioning of automated control systems of an enterprise under information threats are offered taking into account parameters of states of the enterprise at its different levels, realization of network threats, counteraction measures, etc. For each model it is possible to form the state space of a part of an enterprise and on the basis of the series of tests to define state transition parameters thus enabling model representation in the form of a marked graph. The sequences of states possess the properties of semi-Markov processes so semi-Markov apparatus is applicable. Probabilities of state transitions could be computed as a result of numerical solution of the corresponding system of integral equations by Lagrange-Stieltjes technique.
Application of Semi-Markov apparatus for the detection of non-authorized activities during data transfer under network scanning attack proved the validity of the above methods. In addition its application results in creation of a set of security assurance measures to be undertaken. Having obtained state transition probabilities the development of integral security indicator becomes possible thus contributing to the enterprise performance enhancement.
Keywords: information security, automated control systems, network attacks, semi-Markov processes, integral equations system.
Received: 18.04.2020
Document Type: Article
UDC: 004.942
Language: Russian
Citation: R. Fatkieva, “Complex of models for network security assessment of industrial automated control systems”, Tr. SPIIRAN, 19:3 (2020), 621–643
Citation in format AMSBIB
\Bibitem{Fat20}
\by R.~Fatkieva
\paper Complex of models for network security assessment of industrial automated control systems
\jour Tr. SPIIRAN
\yr 2020
\vol 19
\issue 3
\pages 621--643
\mathnet{http://mi.mathnet.ru/trspy1111}
\crossref{https://doi.org/10.15622/sp.2020.19.3.6}
Linking options:
  • https://www.mathnet.ru/eng/trspy1111
  • https://www.mathnet.ru/eng/trspy/v19/i3/p621
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
    Statistics & downloads:
    Abstract page:135
    Full-text PDF :53
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024