Advertisement

A Knowledge Base for Industrial Control Network Security Analysis and Decision-Making with Reasoning Method

  • Hongbiao Gao
  • Jiaming Liu
  • Jianbin LiEmail author
  • Jingde Cheng
Conference paper
  • 277 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12034)

Abstract

Because more and more industrial control systems are connected to networks and more and more information technologies are used in the industrial control systems, the security of industrial control network is a problem. To solve the problem, we can use strong relevant logic as basic logical system to perform reasoning to make security analysis and provide decisions for industrial control network before the actual fault occurred. Although the method has been proposed in our previous work, the method needs a knowledge base to save the collected and reasoned out empirical knowledge. This paper proposes a knowledge base for the method.

Keywords

Industrial control network Security analysis Decision-making Reasoning method Knowledge base 

References

  1. 1.
    Cheng, J.: Entailment calculus as the logical basis of automated theorem finding in scientific discovery. Systematic Methods of Scientific Discovery: Papers from the 1995 Spring Symposium, pp. 105–110. AAAI Press - American Association for Artificial Intelligence (1995)Google Scholar
  2. 2.
    Cheng, J.: A strong relevant logic model of epistemic processes in scientific discovery. Front. Artif. Intell. Appl. 61, 136–159 (2000)zbMATHGoogle Scholar
  3. 3.
    Cheng, J., Nara, S., Goto, Y.: FreeEnCal: a forward reasoning engine with general-purpose. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007. LNCS (LNAI), vol. 4693, pp. 444–452. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-74827-4_56CrossRefGoogle Scholar
  4. 4.
    Figueira, P., Bravo, C., Lopez, J.: Improving information security risk analysis by including threat-occurrence predictive models. Comput. Secur. 88, 101609 (2020)CrossRefGoogle Scholar
  5. 5.
    Gao, H., Goto, Y., Cheng, J.: A systematic methodology for automated theorem finding. Theor. Comput. Sci. 554, 2–21 (2014)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Gao, H., Li, J., Cheng, J.: Measuring interestingness of theorems in automated theorem finding by forward reasoning: a case study in Tarski’s geometry. In: Proceedings of 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, pp. 168–173. IEEE Computer Society Press (2018). (Best Paper Award)Google Scholar
  7. 7.
    Gao, H., Li, J., Cheng, J.: Industrial control network security analysis and decision-making by reasoning method based on strong relevant logic. In: Proceedings of 4th IEEE Cyber Science and Technology Congress, pp. 289–294. IEEE Computer Society Press (2019)Google Scholar
  8. 8.
    Huang, K., Zhou, C., Qin, Y., Tu, W.: A game-theoretic approach to cross-layer security decision-making in industrial cyber-physical systems. IEEE Trans. Ind. Electron. 67(3), 2371–2379 (2020)CrossRefGoogle Scholar
  9. 9.
    Karimireddy, T., Zhang, S.: A hybrid method for secure and reliable transmission on industrial automation and control networks in Industry 4.0. In: Proceedings of the 2019 International Conference on Automation and Computing, pp. 1–6 (2019)Google Scholar
  10. 10.
    Lin, C., Wu, S., Lee, M.: Cyber attack and defense on industry control systems. In: Proceedings of the 2017 International Conference on Dependable and Secure Computing, pp. 524–526 (2017)Google Scholar
  11. 11.
    Line, M., Zand, A., Stringhini, G., Kemmerer, R.: Targeted attacks against industrial control systems: is the power industry prepared. In: Proceedings of the 2nd Workshop on Smart Energy Grid Security, pp. 13–22 (2014)Google Scholar
  12. 12.
    Qin, Y., Zhang, Y., Feng, W.: TICS: trusted industry control system based on hardware security module. In: Wen, S., Wu, W., Castiglione, A. (eds.) CSS 2017. LNCS, vol. 10581, pp. 485–493. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-69471-9_37CrossRefGoogle Scholar
  13. 13.
    Schumann, M., Drusinsky, D., Michael, J., Wijesekera, D.: Modeling human-in-the-loop security analysis and decision-making processes. IEEE Trans. Softw. Eng. 40(2), 154–166 (2014)CrossRefGoogle Scholar
  14. 14.
    Wood, A., He, Y., Maglaras, L., Janicke, H.: A security architectural pattern for risk management of industry control systems within critical national infrastructure. Int. J. Crit. Infrastruct. 13, 113–132 (2017)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Hongbiao Gao
    • 1
  • Jiaming Liu
    • 1
  • Jianbin Li
    • 1
    Email author
  • Jingde Cheng
    • 2
  1. 1.School of Control and Computer EngineeringNorth China Electric Power UniversityBeijingChina
  2. 2.Department of Information and Computer SciencesSaitama UniversitySaitamaJapan

Personalised recommendations