Smidts / Ray / Zhu | Cyber-Security Threats and Response Models in Nuclear Power Plants | Buch | sack.de

Smidts / Ray / Zhu Cyber-Security Threats and Response Models in Nuclear Power Plants



1. Auflage 2022, 72 Seiten, Kartoniert, Format (B × H): 155 mm x 235 mm Reihe: SpringerBriefs in Computer Science
ISBN: 978-3-031-12710-6
Verlag: Springer, Berlin


Smidts / Ray / Zhu Cyber-Security Threats and Response Models in Nuclear Power Plants

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well.
A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well.
This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.

Weitere Infos & Material


Introduction.- Probabilistic Risk Assessment: Nuclear Power Plants and Introduction to the Context of Cyber Security.- Machine Learning based Abnormal Event Detection and Classification.- Game-Theoretic Design of Response Systems.- Experimental Testbeds and Design of Experiments.- Conclusions.


Pietrykowski, Michael C.
Carol Smidts: Dr. Carol Smidts is a Professor at The Ohio State University. She graduated with a B.S./M.S., and a Ph.D. in Engineering Physics from the Université Libre de Bruxelles, Belgium in 1986, and in 1991, respectively. She became an Assistant Professor, and later an Associate Professor in the Reliability Engineering Program at the University of Maryland, College Park. Professor Smidts joined The Ohio State University Department of Mechanical and Aerospace Engineering as a Full Professor in 2008. Her research lies in risk and reliability analysis and in human factors, instrumentation and control, including human reliability analysis, probabilistic analysis of dynamics for complex systems, reliability analysis of digital instrumentation and control systems, software reliability modeling and software test automation, and distributed test facility design. She is a Fellow of IEEE.
Indrajit Ray: Dr. Indrajit Ray is a Professor and Associate Chair in the Department of Computer Science at the Colorado State University. Previously he was an Assistant Professor in the Computer and Information Science at University of Michigan-Dearborn. He received his Ph.D. degree in Information Technology from George Mason University in Fairfax, VA in 1997. His undergraduate degree is B.E. in Computer Science and Engineering from Bengal Engineering College, India, (currently known as Bengal Engineering and Science University) in 1984. He also received the M.E. degree in Computer Science and Engineering from Jadavpur University, India, in 1991. His research interests are in areas of data and application security, network security, security modeling, risk management, trust models, privacy and digital forensics.
Quanyan Zhu: Dr. Quanyan Zhu received B. Eng. in Honors Electrical Engineering from McGill University in 2006, M. A. Sc. from the University of Toronto in 2008, and Ph.D. from the University of Illinois at Urbana-Champaign (UIUC) in 2013. After stints at Princeton University, he is currently an associate professor at the Department of Electrical and Computer Engineering, New York University (NYU). He is an affiliated faculty member of the Center for Urban Science and Progress (CUSP) and Center for Cyber Security (CCS) at NYU. He is a recipient of many awards, including NSF CAREER Award, NYU Goddard Junior Faculty Fellowship, NSERC Postdoctoral Fellowship (PDF), NSERC Canada Graduate Scholarship (CGS), and Mavis Future Faculty Fellowships. He spearheaded and chaired INFOCOM Workshop on Communications and Control on Smart Energy Systems (CCSES), Midwest Workshop on Control and Game Theory (WCGT), and ICRA workshop on Security and Privacy of Robotics. His current research interests include game theory, machine learning, cyber deception, network optimization and control, smart cities, Internet of Things, and cyber-physical systems. He has served as the general chair or the TPC chair of the 7th and the 11th Conference on Decision and Game Theory for Security (GameSec) in 2016 and 2020, the 9th International Conference on NETwork Games, COntrol and OPtimisation (NETGCOOP) in 2018, the 5th International Conference on Artificial Intelligence and Security (ICAIS 2019) in 2019, and 2020 IEEE Workshop on Information Forensics and Security (WIFS). He is a co-author of three recent books published by Springer: Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (with S. Rass, S. Schauer, and S. König), A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design (with J. Chen), and Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach (with Z. Xu).
Pavan Kumar Vaddi: Mr. Pavan Kumar Vaddi is a Ph.D. student in the Reliability and Risk Laboratory in the department of Mechanical and Aerospace Engineering at The Ohio State University. He received his B.Tech. degree in Mech


Ihre Fragen, Wünsche oder Anmerkungen

Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.