期刊文献+

工业控制设备安全测试技术 被引量:4

Security evaluation for industrial control devices
原文传递
导出
摘要 工业控制设备(ICDs)广泛应用于石油化工、电力水利、轨道交通等国家关键基础设施领域,其正常运行直接关系到工业生产安全、经济安全甚至是国家安全。该文总结了现有工业控制设备普遍存在的共性安全问题,分析了其存在的根源。在此基础上从信息空间和物理空间这2方面分析了网络攻击带来的危害影响,最后总结了工业控制设备安全测试的标准规范、测评认证与面临的问题和挑战。 Industrial control devices (ICDs) are widely used in many industrial facilities such as petrochemical factories, power generation plants, water treatment plants, and transportation systems. The cyber security of such devices directly affects industrial production, which affects our economic security as well as our national security. This paper describes common cyber security issues in these devices and the root causes of these issues. The effects of cyber attacks are also analyzed for attacks from the information space and the physical space connected to the ICDs. Finally, security evaluation techniques are given including standards, evaluation methods and certifications along with future research challenges.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第1期29-34,共6页 Journal of Tsinghua University(Science and Technology)
基金 国家科技重大专项资助项目(2012ZX03002002)
关键词 工业控制设备(ICDs) 共性安全问题 信息空间 物理空间 安全测试 industrial control devices (ICDs) controller securityissues information space physical space securityevaluation
  • 相关文献

参考文献17

  • 1Luders S.Stuxnet and the impact on accelerator control systems[C]//Proceedings of the 13th Conference on Accelerator and Large Experimental Physics Control Systems.Geneva,Switzerland:JACoW,2011:1285-1288.
  • 2Kube N,Yoo K,Hoffman D.Automated testing of industrial control devices:The Delphi database[C]//Proceedings of 6th IEEE/ACM International Workshop on Automation of Software Test.New York,USA:Association for Computing Machinery Press,2011:71-76.
  • 3彭勇,江常青,谢丰,戴忠华,熊琦,高洋.工业控制系统信息安全研究进展[J].清华大学学报(自然科学版),2012,52(10):1396-1408. 被引量:176
  • 4IEC62443.Security for Industrial Automation and Control Systems[S].Geneva,Switzerland:International Electrotechnical Commission,2010.
  • 5ICS-CERT.Control system internet accessibility[Z/OL].(2012-11-20),http://www.cs.unh.edu/~it666/reading_list/Physical/cert_scada_shodan_alert.pdf.
  • 6Florian S,MA Zhengdong,Thomas B,et al.A survey on threats and vulnerabilities in smart metering infrastructures[J].International Journal of Smart Grid and Clean Energy,2012,1(1):22-28.
  • 7Sifferlin A.Wireless medical devices vulnerable to hacking[Z/OL].(2013-04-22),http://www.toppatch.com/wp-content/uploads/2012/04/2012_Wireless-Medical-DevicesVulnerable-to-Hacking-_-TIME.pdf.
  • 8Radcliffe J.Hacking medical devices for fun and insulin:Breaking the human SCADA system[Z/OL].(2013-04-30),http://cs.uno.edu/~dbilar/BH-US-2011/materials/Radcliffe/BH_US_11_Radcliffe_Hacking_Medical_Devices_WP.pdf.
  • 9National Institute of Standards and Technology.Guide to Industrial Control Systems(ICS)Security[M].Gaithersburg,USA:NIST,2011.
  • 10王中杰,谢璐璐.信息物理融合系统研究综述[J].自动化学报,2011,37(10):1157-1166. 被引量:160

二级参考文献132

  • 1Lee E. Computing Foundations and Practice for Cyber-Physical Systems: a Preliminary Report, Technical Report UCB/EECS-2007-72, University of California, USA, 2007.
  • 2Baheti R, Gill H. Cyber-physical systems. The Impact of Control Technology. Washington D.C., USA: IEEE, 2011. 161-166.
  • 3CPS Steering Group. Cyber-physical systems executive summary [Online], available: http://precise.seas. upenn.edu/events/iccps11/_doc/CPS-Executive-Summary. pdf, June 4, 2011.
  • 4Lin J, Sedigh S, Miller A. A general framework for quantitative modeling of dependability in cyber-physical systems: a proposal for doctoral research. In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference. Seattle, USA: IEEE, 2009. 668-671.
  • 5Sastry S S. Networked embedded systems: from sensor webs to cyber-physical systems. In: Proceedings of the 10th International Conference on Hybrid Systems: Computation and Control. Berlin, Germany: Springer, 2007. 1-1.
  • 6Branicky M. CPS initiative overview. In: Proceedings of the IEEE/RSJ International Conference on Robotics and Cyber-Physical Systems. Washington D.C., USA: IEEE, 2008.
  • 7Krogh B, Ilic M D, Sastry S S. Networked Embedded Control for Cyber-Physical Systems: Research Strategies and Roadmap, Technical Report, Team for Research in Ubitquitous Secure Technology, USA, 2007.
  • 8马文方. CPS:从感知网到感控网. 中国计算机报, 2010, 25.
  • 9Rajkumar R, Insup L, Lui S, Stankovic J. Cyber-physical systems: the next computing revolution. In: Proceedings of the 47th ACM/IEEE Design Automation Conference. California, USA: IEEE, 2010. 731-736.
  • 10Ilic M D, Xie L, Khan U A, Moura J M F. Modeling future cyber-physical energy systems. In: Proceedings of the IEEE Power Engineering Society General Meeting. Pittsburgh, USA: IEEE, 2008. 1-9.

共引文献349

同被引文献33

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部