Cyber-Security Evaluation for a Hypothetical Nuclear Power Plant using the Attack Tree Method

dc.contributor.authorAkinola, A. A.
dc.contributor.authorKuye, A. O.
dc.contributor.authorAyodeji, A
dc.date.accessioned2019-09-16T13:53:21Z
dc.date.available2019-09-16T13:53:21Z
dc.date.issued2015
dc.descriptionStaff publicationsen_US
dc.description.abstractThe widespread introduction of digital network systems in nuclear power plants has increased such infrastructures vulnerability to cyber-attacks. The attack tree approach to evaluate and analyze cyber-attacks quantitatively, in a nuclear power plants’ network system is presented in this work. Information on a hypothetical nuclear power plants’ network system was used to build attack trees that show different attack paths that external adversaries can use to compromise the network system. To assert the ease or difficulty of compromising each attack tree, numerical values are assigned to the leaf nodes of each attack tree. The return on attack for each intermediate node and the root node are then calculated. This calculation is done by randomly varying the vulnerability values of the leaf nodes within the designated range. On observing high return of attack values with the two attack trees developed, countermeasures were then implemented. Modified network systems were constructed and the return on attack recalculated. The return on attack (ROA) values for the nodes were observed to decrease, after implementing the countermeasures on the network security systems.en_US
dc.identifier.citationAkinola, A. A, Kuye, A. and Ayodeji, A., (2015). Cyber-Security Evaluation for a Hypothetical Nuclear Power Plant using the Attack Tree Method. Journal of Physical Security, Vol.8(1), 19 ‐36pp.en_US
dc.identifier.urihttps://ir.unilag.edu.ng/handle/123456789/5620
dc.language.isoenen_US
dc.publisherJournal of Physical Securityen_US
dc.relation.ispartofseriesJournal of Physical Security;Vol.8(1)
dc.subjectAttack treeen_US
dc.subjectVulnerability assessmenten_US
dc.subjectReturn on attacken_US
dc.subjectCyber securityen_US
dc.subjectResearch Subject Categories::TECHNOLOGY::Chemical engineeringen_US
dc.titleCyber-Security Evaluation for a Hypothetical Nuclear Power Plant using the Attack Tree Methoden_US
dc.typeArticleen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
JPS Vol. 8 No. 1 (2015) Akinola et al. - Complete.pdf
Size:
3.78 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: