期刊文献+

工业控制网络安全脆弱性分析技术研究 被引量:3

Research on Vulnerability Analysis Technology of Industrial Control System
下载PDF
导出
摘要 随着工业控制网络与互联网的深入融合,攻击者利用工业控制网络的安全漏洞对关键基础设施进行破坏,这对工业生产造成了极大的安全威胁。利用攻击图技术对工业控制网络进行脆弱性分析,提出了一种安全修复选择策略。该策略利用工业控制网络主机资产的分层特点和漏洞的威胁程度来评估所有可能攻击路径的安全风险,进而选择安全风险最高的攻击路径进行修复。最后,在模拟的网络环境中验证了其可行性和合理性。 With the deep integration of industrial control network and Internet,attackers exploit vulnerabilities in industrial control systems to disrupt critical infrastructure,and that poses a great security threat to industrial production.In the paper,the attack graph is used to analyze the industrial control network vulnerability,then an industrial control system repair strategy is proposed based on the combination of host assets and threats from those vulnerabilities.The strategy takes into account the hierarchical nature of the host assets of industrial control network and the periodicity of exploiting vulnerability to evaluate the security risk value of vulnerabilities.Then,security risk values of attack paths are taken as the selection criteria of repair strategies.Finally,the feasibility and rationality of the proposed scheme are verified in the simulated network environment.
出处 《中原工学院学报》 CAS 2017年第6期63-69,共7页 Journal of Zhongyuan University of Technology
基金 国家自然科学基金项目(61702503) 河南省科技攻关项目(172102210591) 郑州市科技攻关项目(153PKJGG131) 2015年河南省教育技术装备和实践教育研究立项课题(GZS031 GZS137) 2016年度中原工学院教学改革与研究重点项目
关键词 工业控制网络 脆弱性分析 攻击图 加固策略 industrial control system vulnerability analysis attack graph repair strategy
  • 相关文献

参考文献5

二级参考文献32

  • 1Bouchti A E, Haqiq A. Modeling cyber-attack for SCADA systemsusing CoPNet approach [ C ] //Proc of International Symposium on Se-curity and Safety of Complex Systems. 2012:125-133.
  • 2Schneier B. Attack trees[ J]. Dr. Dobb’ s Journal of SoftwareTools,1999,24(12) :21-29.
  • 3Ten C W, Liu C C, Govindarasu M. Vulnerability assessment of cyber-security for SCADA system using attack trees [ C]//Proc of IEEE Con-ference on Power Engineering Society General Meeting. 2007:1-8.
  • 4Park G Y, Lee C K, Choi J G, ei al. Cyber security analysis by at-tack trees for a reactor protection system [ C]//Proc of Korean Nucle-ar Society (KNS) Fall Meeting. 2008 ; 268-279.
  • 5Byres E J, Franz M, Miller D. The use of attack trees in assessingvulnerabilities in SCADA systems [ C ]//Proc of International Infra-structure Survivability Workshop. 2008:761-770.
  • 6蒋健雷.某泵站放江SCADA系统及其安全性研究[D].上海:华东理工大学,2011.
  • 7NIST SP800-82, Guide to industrial control system (ICS) security[S ]. Gaithersburg: National Institute of Standards and Technology(NIST). 2011.
  • 8Lv H Y,Cao Y D.Research on network risk situation assessment based onthreat analysis[].International Symposium on Information Science andEngineering.2008
  • 9方滨兴.解读信息安全创新突破点[EB/OL].[2015-10-28].http://www.cert.org.cn/2007051823317.html.
  • 10Wang L Y,Noel S,Jajodia S.Minimum-cost network hardening using attack graphs[J].Computer Communications,2006,29(18):3812-3824.

共引文献75

同被引文献11

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部