期刊文献+

关键基础设施网络安全技术研究进展 被引量:5

Research on network security of critical infrastructure: a survey
下载PDF
导出
摘要 通过对关键基础设施的网络安全现状进行总结,对关键基础设施的安全威胁进行了分类,着重对信息物理融合系统在受到网络攻击时采用的数据词典、证据理论、博弈论等方法进行网络安全防护深入分析,着重分析了基于信任理论的信息物理融合系统的防御方案,阐述了关键基础设施的相关性与脆弱性之间的关系,总结了现有主要的关键基础设施网络安全的模拟技术,对比分析了现有的仿真技术的特点。最后提出了关键基础设施网络安全技术值得深入研究的发展方向。 This paper summarized the network security situation on critical infrastructure,it classified security threats to critical infrastructure. By focusing on the CPS in the network attack,it introduced the data dictionary,evidence theory,game theory analysis,the network security protection. It emphasized the analysis of the defense scheme cyber physical system based on the theory of trust,and studied the relation between the correlation and vulnerability of critical infrastructure. It summarized the network security simulation technologies of critical infrastructure present,and compared the simulation technologies. It put forward the future direction of development of critical infrastructure network security technology.
出处 《计算机应用研究》 CSCD 北大核心 2014年第12期3531-3534,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61170285) 湖南省自然科学基金资助项目(14JJ7043) 湖南省交通运输厅科技进步与创新项目(201405)
关键词 关键基础设施 信息物理融合系统 CPS安全 信息物理攻击 critical infrastructure cyber physical system(CPS) CPS security cyber-physical attacks
  • 相关文献

参考文献32

  • 1DAS S K, KANT K, ZHANG Nan. Handbook on securing cyber-physi- cal critical infrastructure[ M ]. [ S. 1. ] :Morgan Kaufmann ,2012.
  • 2AMIN S, SCHWARTZ G A, HUSSAIN A. In quest of benchmark secu- rity risks to cyber-physical systems [ J ]. IEEE Network, 2013,27 (1) :19-24.
  • 3HUSSAIN A, HEIDEMANN J, PAPADOPOULOS C. A framework for classifying denial of service attacks [ C ]//Proc of ACM Conference Applications,Technologies, Architectures, and Protocols for Computer Communications. 2003:99-110.
  • 4AMIN S, LITRICO X, SASTRY S S, et al. Cyber security of water SCADA systems--part Ⅱ : attack detection using enhanced hydrody- namic models[J], IEEE Trans on Control Systems Technology, 2012.21 ( 5 ) :1679-1693.
  • 5BULDYREV S V, PARSHANI R, PAUL G, et al. Catastrophic cascade of failures in interdependent networks [ J ]. Nature, 2010, 464 (7291) :1025-1028.
  • 6YAMPOLSKIY M, HORVATH P, KOUTSOUKOS X D, et al. Syste- matic analysis of cyber-attacks on cps-evaluating applicability of DFD- based approach [ C ]//Proc of the 5th International Symposium on Re- silient Control Systems. 2012:55-62.
  • 7WHEELER D A, LARSON G. Techniques for cyber attack attribu- tion, IDA Paper P-3792[R]. Alexandria, Virginia: Institute for De- fense Analyses ,2003.
  • 8HUNKER J, UTCHINSON R, MARGULIES J. Attribution of cyber at- tacks on process control systems [ J ]. Critical Infrastructure Protec- tion Ⅱ, The International Federation for Information Proces- sing ,2009,290:87-99.
  • 9DYNES S. Emergent risks in critical infrastructures [ J]. Critical In- frastructure Protection Ⅱ ,The International Federation for Infor- mation Processing ,2009,290:1-16.
  • 10STELTE B, RODOSEK G D. Assuring trustworthiness of sensor data for cyber-physical systems[ C ]//Proc of IFIP/IEEE International Symposium on Integrated Network Management. 2013:395-402.

二级参考文献49

  • 1Timmerman P.Vulnerability,resilience and the collapse of soeiety[Z].Environmental Monograph.Toronto:Institute for Environmental Studies,1981.
  • 2Myung Y S,Kim H J.A cutting plane algorithm for computing k-edge survivability of a network[J].European Journal of Operational Research,2004,156 (3):579-589.
  • 3Murray A T,Matisziw T C,Grubesic T H.Critical network infrastructure analysis:interdiction and system flow[J].Journal of Geographical Systems,2007,9 (2):103-117.
  • 4Matisziw T C.Murray A T.Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure[J].Computers & Operations Research,2009,36 (1):16 -26.
  • 5Bryson K M,Millar H,Joseph A,Mobolurin A.Using formal MS/OR modeling to support disaster recovery planning[J].European Journal of Operational Research,2002,141(3):679 -688.
  • 6马国忠.灾害情况下FIM模型在高速公路网络上的应用[D].成都:西南交通大学,2010.9:10-13.
  • 7Matisziw T C,Murray A T,Grubesic T H.Exploring the vulnerability of network infrastructure to disruption[J].The Annals of Regional Science,2009,43(2):307 -321.
  • 8龚勋.图论与网络最优化算法[M].重庆:重庆大学出版社,2009:38-72.
  • 9ROBERT T. MARSH. President's Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America's Infrastructures[R/OL]. http ://www. fas. org/sgp/library/pccip, pdf, 2005.10.
  • 10S. M. Rinaldi, J. P. Peerenboom,T. K. Kelly. Identifying, understanding and analyzing critical infrastructure interdependencies[J]. IEEE Control Systems Magazine, 2001, 21 (6) : 11 - 25.

共引文献15

同被引文献59

  • 1Stouffer K, Falco J, Scarfone K. Guide to industrial control system (ICS) security, SP800- 82 [ R ]. Gaithersburg: National Institute of Standards and Technology (NIST) , 2011.
  • 2Cyber security assessment of industrial control system[ R]. Washing- ton DC: Department of Homeland Security,2010.
  • 3Office of Electricity Delivery and Energy Reliability. National SCADA test bed: enhancing control system security in the energy sector[ EB/ OL]. (2014-06-16). http://energy, gov/sites/pwd/files/oeprod/ NSTB_Fact_Sheet_FINAL_09 - 16- 09. pdf.
  • 4Common cyber security vulnerabilities observed in control system as- sessments by the INL NSTB program, INI_,/EXT-08-13979 [ R]. I- daho: Idaho National Laboratory, 2008.
  • 5Wang Chunlei, Fang Lan, Dai Yiqi. A simulation environment for SCADA security analysis and assessment [ C ]//Proc of International Conference on Measuring Technology and Mechatronics Automation. 2010 : 342-347.
  • 6Queiroz c, Mahmood A, Hu Jiankun, et al. Building a SCADA secu- rity testbed [ C ]//Proc of the 3 rd International Conference on Network and System Security. Washington DC: IEEE Press, 2009:357-364.
  • 7Varga A. The OMNeT ++ discrete event simulation system [ C ]// Proc of the European Simulation Multiconference. 2001:319-324.
  • 8The OMNeT ++ Community. INET framework for OMNeT ++ 4.0 [EB/OL]. (2014-06-02). http://inet, omnetpp, org,/.
  • 9The LEGO Group. LEGO mindstroms NXT [EB/OL]. (2014-06- 02 ). http ://mindstorm. lego. com.
  • 10liaimbault 5. Libmodbus:a modbus library ior Linux and 05X L EB/ OL]. (2014-06-02). http://www, libmodbus, org.

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部