Skip to main content

A Knowledge Base for Industrial Control Network Security Analysis and Decision-Making with Reasoning Method

  • Conference paper
  • First Online:
Intelligent Information and Database Systems (ACIIDS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12034))

Included in the following conference series:

  • 1661 Accesses

Abstract

Because more and more industrial control systems are connected to networks and more and more information technologies are used in the industrial control systems, the security of industrial control network is a problem. To solve the problem, we can use strong relevant logic as basic logical system to perform reasoning to make security analysis and provide decisions for industrial control network before the actual fault occurred. Although the method has been proposed in our previous work, the method needs a knowledge base to save the collected and reasoned out empirical knowledge. This paper proposes a knowledge base for the method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cheng, J.: Entailment calculus as the logical basis of automated theorem finding in scientific discovery. Systematic Methods of Scientific Discovery: Papers from the 1995 Spring Symposium, pp. 105–110. AAAI Press - American Association for Artificial Intelligence (1995)

    Google Scholar 

  2. Cheng, J.: A strong relevant logic model of epistemic processes in scientific discovery. Front. Artif. Intell. Appl. 61, 136–159 (2000)

    MATH  Google Scholar 

  3. Cheng, J., Nara, S., Goto, Y.: FreeEnCal: a forward reasoning engine with general-purpose. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007. LNCS (LNAI), vol. 4693, pp. 444–452. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74827-4_56

    Chapter  Google Scholar 

  4. Figueira, P., Bravo, C., Lopez, J.: Improving information security risk analysis by including threat-occurrence predictive models. Comput. Secur. 88, 101609 (2020)

    Article  Google Scholar 

  5. Gao, H., Goto, Y., Cheng, J.: A systematic methodology for automated theorem finding. Theor. Comput. Sci. 554, 2–21 (2014)

    Article  MathSciNet  Google Scholar 

  6. Gao, H., Li, J., Cheng, J.: Measuring interestingness of theorems in automated theorem finding by forward reasoning: a case study in Tarski’s geometry. In: Proceedings of 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, pp. 168–173. IEEE Computer Society Press (2018). (Best Paper Award)

    Google Scholar 

  7. Gao, H., Li, J., Cheng, J.: Industrial control network security analysis and decision-making by reasoning method based on strong relevant logic. In: Proceedings of 4th IEEE Cyber Science and Technology Congress, pp. 289–294. IEEE Computer Society Press (2019)

    Google Scholar 

  8. Huang, K., Zhou, C., Qin, Y., Tu, W.: A game-theoretic approach to cross-layer security decision-making in industrial cyber-physical systems. IEEE Trans. Ind. Electron. 67(3), 2371–2379 (2020)

    Article  Google Scholar 

  9. Karimireddy, T., Zhang, S.: A hybrid method for secure and reliable transmission on industrial automation and control networks in Industry 4.0. In: Proceedings of the 2019 International Conference on Automation and Computing, pp. 1–6 (2019)

    Google Scholar 

  10. Lin, C., Wu, S., Lee, M.: Cyber attack and defense on industry control systems. In: Proceedings of the 2017 International Conference on Dependable and Secure Computing, pp. 524–526 (2017)

    Google Scholar 

  11. Line, M., Zand, A., Stringhini, G., Kemmerer, R.: Targeted attacks against industrial control systems: is the power industry prepared. In: Proceedings of the 2nd Workshop on Smart Energy Grid Security, pp. 13–22 (2014)

    Google Scholar 

  12. Qin, Y., Zhang, Y., Feng, W.: TICS: trusted industry control system based on hardware security module. In: Wen, S., Wu, W., Castiglione, A. (eds.) CSS 2017. LNCS, vol. 10581, pp. 485–493. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69471-9_37

    Chapter  Google Scholar 

  13. Schumann, M., Drusinsky, D., Michael, J., Wijesekera, D.: Modeling human-in-the-loop security analysis and decision-making processes. IEEE Trans. Softw. Eng. 40(2), 154–166 (2014)

    Article  Google Scholar 

  14. Wood, A., He, Y., Maglaras, L., Janicke, H.: A security architectural pattern for risk management of industry control systems within critical national infrastructure. Int. J. Crit. Infrastruct. 13, 113–132 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianbin Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, H., Liu, J., Li, J., Cheng, J. (2020). A Knowledge Base for Industrial Control Network Security Analysis and Decision-Making with Reasoning Method. In: Nguyen, N., Jearanaitanakij, K., Selamat, A., Trawiński, B., Chittayasothorn, S. (eds) Intelligent Information and Database Systems. ACIIDS 2020. Lecture Notes in Computer Science(), vol 12034. Springer, Cham. https://doi.org/10.1007/978-3-030-42058-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-42058-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-42057-4

  • Online ISBN: 978-3-030-42058-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics