期刊文献+

基于FNN的多Agent SCADA安全防御模型 被引量:2

SCADA security defense model based on multi-Agent and FNN
下载PDF
导出
摘要 作为ICS(Industrial Control System)的重要组成部分,SCADA(Supervisory Control and Data Acquisition)受到的恶意攻击与日俱增。为了充分确保其信息安全,可以选择多Agent技术来实现基于FNN(Factor Neuron Network)的安全防御方法,并最终建立起一个SCADA系统安全防御模型。该模型继承了多Agent技术与FNN的优点,配置方便,易于维护,可以实时更新以及在线扩展,具备良好的通用性与可塑性,从而克服了现有IDS(Intrusion Detection System)的诸多不足,有效保障SCADA安全可靠地运行。 SCADA is an important part of industrial control system, and the malicious attack on it is increasing. In order to ensure its informa- tion security, this paper selected a security method based on FNN and using multi-Agent to achieve it, then established a SCADA system security defense model. The model has advantages of both FNN and multi-Agent, such as easily configure or maintain, real-time update online, universal and plasticity. Therefore, it overcomes defects of the traditional intrusion detection system, and effectively ensures the safe and reliable operation of SCADA.
出处 《微型机与应用》 2016年第7期9-11,21,共4页 Microcomputer & Its Applications
基金 国家自然科学基金面上项目(61175122)
关键词 多AGENT FNN 安全防御 SCADA multi-Agent FNN security and defense SCADA
  • 相关文献

参考文献9

二级参考文献36

  • 1陈蔚,庄毅.基于多Agent的分布式入侵检测系统设计与实现[J].计算机工程与应用,2004,40(29):139-141. 被引量:6
  • 2Chi S D,Park J S,Jung K C,et al.Network security modeling and cyber attack simulation methodology[C] //LNCS 21 19:ACISP 2001,2001:320-333.
  • 3Floyd S,Paxson V.Difficulties in simulating the Internet[J].IEEE/ACM Transactions on Networking,2001,9(4):392-403.
  • 4Kotenko I.Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in Internet[C] //19th European Simulation Multiconference"Simulation in Wider Euope",2005.
  • 5Kotenko I,Ulanov A.Simulation of Internet DDoS attacks and defense[C] //LNCS 4176:9th Information Security Conference,2006:327-342.
  • 6Buzing P,Mors A,Valk J,et al.Coordinating self-interested planning agents[J].Autonomous Agents and Multi-Agent Systems,2006,12(2):199-218.
  • 7David Helan. Stuxnet: analysis,myths and realities [J].Actusecu 27,2010:14-23.
  • 8Amr Thabet.Stuxnet_Malware_Analysis_Paper[J].Freelancer Malware Researcher, 2010: 3-28.
  • 9Nicolas Falliere, Liam O Murchu, Eric Chien.W32.Stuxnet Dossier[R]. Symantec company, 2011.16-38.
  • 10Matrosov, Rodionov.StuxnetZUnder the Microscope 1.3[R]. ESET Company, 2010.24-65,.

共引文献108

同被引文献24

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部