Vulnerability Analysis of CSP Based on Stochastic Game Theory

With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols (ICPs), which has not yet been at...

Full description

Saved in:
Bibliographic Details
Main Authors: Jiajun Shen, Dongqin Feng
Format: Article
Language:English
Published: Wiley 2016-01-01
Series:Journal of Control Science and Engineering
Online Access:http://dx.doi.org/10.1155/2016/4147251
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832558074515161088
author Jiajun Shen
Dongqin Feng
author_facet Jiajun Shen
Dongqin Feng
author_sort Jiajun Shen
collection DOAJ
description With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols (ICPs), which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol (CSP), one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle (MIM) attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.
format Article
id doaj-art-f344a38a516246f2ba20dc4c44ccacd9
institution Kabale University
issn 1687-5249
1687-5257
language English
publishDate 2016-01-01
publisher Wiley
record_format Article
series Journal of Control Science and Engineering
spelling doaj-art-f344a38a516246f2ba20dc4c44ccacd92025-02-03T01:33:24ZengWileyJournal of Control Science and Engineering1687-52491687-52572016-01-01201610.1155/2016/41472514147251Vulnerability Analysis of CSP Based on Stochastic Game TheoryJiajun Shen0Dongqin Feng1National Engineering Laboratory of Safety & Security Technology of Industrial Control System, Zhejiang University, Hangzhou 310000, ChinaNational Engineering Laboratory of Safety & Security Technology of Industrial Control System, Zhejiang University, Hangzhou 310000, ChinaWith the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols (ICPs), which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol (CSP), one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle (MIM) attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively.http://dx.doi.org/10.1155/2016/4147251
spellingShingle Jiajun Shen
Dongqin Feng
Vulnerability Analysis of CSP Based on Stochastic Game Theory
Journal of Control Science and Engineering
title Vulnerability Analysis of CSP Based on Stochastic Game Theory
title_full Vulnerability Analysis of CSP Based on Stochastic Game Theory
title_fullStr Vulnerability Analysis of CSP Based on Stochastic Game Theory
title_full_unstemmed Vulnerability Analysis of CSP Based on Stochastic Game Theory
title_short Vulnerability Analysis of CSP Based on Stochastic Game Theory
title_sort vulnerability analysis of csp based on stochastic game theory
url http://dx.doi.org/10.1155/2016/4147251
work_keys_str_mv AT jiajunshen vulnerabilityanalysisofcspbasedonstochasticgametheory
AT dongqinfeng vulnerabilityanalysisofcspbasedonstochasticgametheory