Vis enkel innførsel

dc.contributor.authorChockalingam, Sabarathinam
dc.contributor.authorPieters, Wolter
dc.contributor.authorTeixeira, André
dc.contributor.authorvan Gelder, Pieter
dc.date.accessioned2023-05-30T11:06:51Z
dc.date.available2023-05-30T11:06:51Z
dc.date.created2023-04-22T08:41:23Z
dc.date.issued2023
dc.identifier.citationJournal of Information Security and Applications. 2023, 75 1-17.en_US
dc.identifier.issn2214-2134
dc.identifier.urihttps://hdl.handle.net/11250/3069325
dc.description.abstractBoth intentional attacks and accidental technical failures can lead to abnormal behaviour in components of industrial control systems. In our previous work, we developed a framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two classes, including knowledge elicitation to construct the directed acyclic graph of BN models. In this paper, we add a systematic method for knowledge elicitation to construct the Conditional Probability Tables (CPTs) of BN models, thereby completing a holistic framework to distinguish between attacks and technical failures. In order to elicit reliable probabilities from experts, we need to reduce the workload of experts in probability elicitation by reducing the number of conditional probabilities to elicit and facilitating individual probability entry. We utilise DeMorgan models to reduce the number of conditional probabilities to elicit as they are suitable for modelling opposing influences i.e., combinations of influences that promote and inhibit the child event. To facilitate individual probability entry, we use probability scales with numerical and verbal anchors. We demonstrate the proposed approach using an example from the water management domain.en_US
dc.description.abstractProbability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failuresen_US
dc.language.isoengen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.subjectBayesiansk Tiltro Nettverken_US
dc.subjectBayesian Belief Networken_US
dc.subjectSikkerheten_US
dc.subjectSafetyen_US
dc.subjectSannsynligheten_US
dc.subjectProbabilityen_US
dc.subjectDatasikkerheten_US
dc.subjectSecurityen_US
dc.titleProbability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failuresen_US
dc.title.alternativeProbability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failuresen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2023 The Author(s). Published by Elsevier Ltd.en_US
dc.subject.nsiVDP::Sikkerhet og sårbarhet: 424en_US
dc.subject.nsiVDP::Security and vulnerability: 424en_US
dc.source.pagenumber1-17en_US
dc.source.volume75en_US
dc.source.journalJournal of Information Security and Applicationsen_US
dc.identifier.doi10.1016/j.jisa.2023.103497
dc.identifier.cristin2142594
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal