期刊文献+

基于层次Petri网的信息物理融合系统安全博弈建模 被引量:4

Security game modeling of cyber-physical systems based on hierarchical Petri nets
下载PDF
导出
摘要 随着信息物理融合系统在工业中的广泛应用,系统安全已成为关注的焦点,信息物理融合系统的物理依赖和信息驱动特点使其面临信息物理双重威胁。为更加有效地进行应对,采取最佳防御策略,建立了基于层次Petri网的信息物理安全分析模型,并给出了描述攻防博弈策略的博弈网模型,进行了安全博弈分析,构建了纳什均衡策略,并采用萤火虫群算法进行了求解。最后以防空网络为实例进行了模拟分析,验证了模型的有效性。 For wide application of evolution of cyber-physical systems (CPS) in the industry, security has been an important issue. The characters of physical dependence and information driven expose the CPS to the risk of cyber-physical threats. To effectively address the problems, this paper constructed a cyber-physieal attacking model based on hierarchical Petri nets. Fur- thermore, it built a game network model of attack-defense that represents attack-defense game strategies, and analyzed security gaming. Moreover, it adopted the glowworm swarm optimization algorithm to solve the Nash equilibrium issue. Finally, it im- plemented the security game analysis with the air defense network. Results prove the validity of proposed model.
出处 《计算机应用研究》 CSCD 北大核心 2017年第8期2439-2442,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61201299)
关键词 信息物理融合系统 安全 PETRI网 博弈论 cyber-physical systems security Petri net game theory
  • 相关文献

参考文献7

二级参考文献121

  • 1杨孟飞,王磊,顾斌,赵雷.CPS在航天器控制系统中的应用分析[J].空间控制技术与应用,2012,38(5):8-13. 被引量:12
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 4刘天坤,熊新平,赵育善.基于Petri网的网络化防空导弹体系作战效能评估[J].地面防空武器,2006(4):46-49. 被引量:3
  • 5Sheyner O,Haines J,Jha S,Lippmann R,Wing J.Automated generation and analysis of attack graphs//Proceedings of the 2002 IEEE Symposium on Security and Privacy.Berkeley,CA,2002:273-284.
  • 6Jha S,Sheyner O,Wing J M.Two formal analyses of attack graphs//Proceedings of the Computer Security Foundations Workshop (CSFW).Cape Breton,Nova Scotia,2002:49-63.
  • 7Ramakrishnan C R,Sekar R.Model-based analysis of configuration vulnerabilities.Journal of Computer Security (JCS),2002,10(1/2):189-209.
  • 8Besson F,Jensen J,Métayer D L,Thorn T.Model checking security properties of control flow graphs.Computer Security,2001,9(3):217-250.
  • 9Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities//Proceedings of the IEEE Symposium on Security and Privacy.Oakland,California,2001:156-165.
  • 10Wang D,Madan B,Trivedi K S.Security analysis of SITAR intrusion-tolerant system//Proceedings of the ACM Workshop Survivable and Self-Regenerative Systems.Fairfax,VA,2003:23-32.

共引文献90

同被引文献92

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部