01491nas a2200157 4500000000100000008004100001260001500042100001600057700001300073700001100086700001500097245008300112856009300195520103100288022001401319 2021 d c2021-06-211 aShuang Wang1 aLei Ding1 aHe Sui1 aZhaojun Gu00aCybersecurity risk assessment method of ICS based on attack-defense tree model uhttps://content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs2011263 aCybersecurity risk assessment is an important means of effective response to network attacks on industrial control systems. However, cybersecurity risk assessment process is susceptible to subjective and objective effects. To solve this problem, this paper introduced cybersecurity risk assessment method based on fuzzy theory of Attack-Defense Tree model and probability cybersecurity risk assessment technology, and applied it to airport automatic fuel supply control system. Firstly, an Attack-Defense Tree model was established based on the potential cybersecurity threat of the system and deployed security equipment. Secondly, the interval probability of the attack path was calculated using the triangular fuzzy quantification of the interval probabilities of the attack leaf nodes and defensive leaf nodes. Next, the interval probability of the final path was defuzzified. Finally, the occurrence probability of each final attack path was obtained and a reference for the deployment of security equipment was provided. a1064-1246