MARC details
000 -LEADER |
fixed length control field |
03738cam a2200325 i 4500 |
INTERNATIONAL STANDARD BOOK NUMBER |
ISBN |
9783031127113 |
INTERNATIONAL STANDARD BOOK NUMBER |
ISBN |
3031127110 |
DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
MAIN ENTRY--AUTHOR NAME |
Personal name |
Smidts, C. |
TITLE STATEMENT |
Title |
Cyber-security threats and response models in power plants / |
Statement of responsibility, etc |
Carol Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski |
Copyright Date |
Place of publication |
Cham, Switzerland : |
Name of publisher |
Springer, |
Year of publication or production |
2022 |
PHYSICAL DESCRIPTION |
Number of Pages |
1 online resource |
SERIES STATEMENT |
Series statement |
SpringerBriefs in Computer Science, |
FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction -- Probabilistic Risk Assessment: Nuclear Power Plants and Introduction to the Context of Cyber Security -- Machine Learning based Abnormal Event Detection and Classification -- Game-Theoretic Design of Response Systems -- Experimental Testbeds and Design of Experiments -- Conclusions |
SUMMARY, ETC. |
Summary, etc |
This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well. A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well. This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Computer security. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Nuclear power plants |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Ray, Indrajit |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Zhu, Quanyan, |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Vaddi, Pavan Kumar, |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Zhao, Yunfei, |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Huang, Linan, |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Diao, Xiaoxu, |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Talukdar, Rakibul, |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Pietrykowski, Michael C., |
ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://rave.ohiolink.edu/ebooks/ebc2/9783031127113 |
ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://link.springer.com/10.1007/978-3-031-12711-3 |
ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://go.ohiolink.edu/goto?url=https://link.springer.com/10.1007/978-3-031-12711-3 |
ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |