[1]YANG Li,QIN Hongmei,SU Huawen.Research on security risk assessment of SCADA system based on the cloud model and combination weighting[J].CAAI Transactions on Intelligent Systems,2022,17(5):969-979.[doi:10.11992/tis.202107005]
Copy
CAAI Transactions on Intelligent Systems[ISSN 1673-4785/CN 23-1538/TP] Volume:
17
Number of periods:
2022 5
Page number:
969-979
Column:
学术论文—智能系统
Public date:
2022-09-05
- Title:
-
Research on security risk assessment of SCADA system based on the cloud model and combination weighting
- Author(s):
-
YANG Li; QIN Hongmei; SU Huawen
-
School of Computer Science, Southwest Petroleum University, Chengdu 610500, China
-
- Keywords:
-
SCADA system; security risk assessment; cloud model; combination weighting; cloud similarity; ambiguity; randomness; cloud digital characteristics
- CLC:
-
TP399
- DOI:
-
10.11992/tis.202107005
- Abstract:
-
The current (supervisory control and data acquisition, SCADA) system faces a huge security threat, and monitoring and evaluating its risk status is an effective countermeasure. In this paper, a cloud model theory is introduced to the security risk assessment of the SCADA system, and a security risk assessment model is proposed based on the cloud model and combination weighting to effectively deal with the problem of ambiguity and randomness in the assessment process. Firstly, a security risk assessment index system is constructed from assets, threats, vulnerabilities, and security measures of a SCADA system, Then the least squares estimate is used to obtain optimal combination weighting, and the cloud digital characteristics are calculated with the help of cloud generator, to get comprehensive security risk assessment cloud. Next, according to the golden ratio, the standard evaluation cloud is constructed and combined with the improved cloud similarity calculation method to obtain the final evaluation result. Finally, the effectiveness and feasibility of the model are verified through experiments. The research results show that the model can obtain accurate evaluation results, and compared with the fuzzy comprehensive evaluation method, it shows that this method has higher credibility and better evaluation effect. This method not only helps in identifying security risk threats in the SCADA system but also provides a certain reference for security risk assessment in other fields.