Abstract

The paper presents the results of the development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Security models of cyber-physical systems are proposed: “predator–prey” taking into account the computing capabilities and focus of targeted cyberattacks, “predator–prey” taking into account the possible competition of attackers in relation to the “prey”, “predator–prey” taking into account the relationships between “prey species” and “predator species”, “predator–prey” taking into account the relationship between “prey species” and “predator species”. Based on the proposed approach, the coefficients of the Lotka–Volterra model α=0.39, β=0.32, γ=0.29, φ=0.27 were obtained, which take into account the synergy and hybridity of modern threats, funding for the formation and improvement of the protection system, and also allow determining the financial and computing capabilities of the attacker based on the identified threats. The proposed method for assessing the security of cyber-physical systems is based on the developed threat classifier, allows assessing the current security level and provides recommendations regarding the allocation of limited protection resources based on an expert assessment of known threats. This approach allows offline dynamic simulation, which makes it possible to timely determine attackers' capabilities and form preventive protection measures based on threat analysis. In the simulation, actual bases for assessing real threats and incidents in cyber-physical systems can be used, which allows an expert assessment of their impact on both individual security services and security components (cyber security, information security and security of information). The presented simulation results do not contradict the graphical results of the classical Lotka–Volterra model, which indicates the adequacy of the proposed approach for assessing the security of cyber-physical systems

Highlights

  • The creation of large critical infrastructure systems, intensification of research on the dynamics of cyber-physical systems (CPS) require continuous improvement and updating of the existing apparatus for modeling and control of dynamic systems [1,2,3,4,5]

  • The following objectives were set: – to develop security models for developing cyber-physical systems, taking into account the computing capabilities and focus of targeted cyberattacks, possible competition of attackers in relation to the “prey”, the possibility of attackers/cyber groups grouping in order to achieve the cyberattack goals; – to develop security models for cyber-physical systems based on the “predator-prey” model, taking into account relationships between “prey species” and “predator species”; – to develop a method for dynamic assessment of the security of cyber-physical systems based on the Lotka-Volterra “predator-prey” model; – to conduct research on the practical implementation of the proposed approach

  • We describe changes in security levels as a finite-state machine HCPS, the states of which are described by the formula: H CPS = S I,value,T, S0I, (20)

Read more

Summary

Introduction

The creation of large critical infrastructure systems, intensification of research on the dynamics of cyber-physical systems (CPS) require continuous improvement and updating of the existing apparatus for modeling and control of dynamic systems [1,2,3,4,5]. The development of cyber-physical systems in recent years has significantly changed the infrastructures of modern information-cybernetic systems (ICS), and critical infrastructures (CI), as well as Internet-of-things systems (IoTS) Synthesis of these infrastructures makes it possible to significantly expand range of digital services, on the one hand, and increases the level of cyber threats [6,7,8,9]. There is a need for a timely assessment of the current state of the security level of cyber-physical systems (CPS) in the face of modern threats, taking into account the synthesis of infrastructure elements of ICS with IoTS in conditions of dynamic changes in the situation

Literature review and problem statement
The aim and objectives of the study
Research materials and methods
H2 H3 H4 H5 H6 H7 01 02 03 04 05 06 07
CPS CIF w K w j
Conclusions
Findings
IoT Security Maturity Model
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call