期刊文献+

电力工控系统网络入侵和攻击典型模型研究 被引量:6

Research ontypical model of network intrusion and attack in power industrial control system
下载PDF
导出
摘要 针对电力工控系统的运行特征,深入分析电力工控系统入侵攻击的攻击机理和特点,在对电力工控系统攻击特征进行分类整理的基础上,着力突破工控网络空间安全基础理论和关键技术,构建电力工控系统网络入侵与攻击模型,实现攻击者所能够实施攻击行为的准确刻画,为电力工控系统的攻击行为分析监测预警提供理论模型。 According to the running characteristics of power control system,this paper in depth analyzed the characteristics and mechanism of attack power control system intrusion. Based on the classification of attack characteristics of the power control system,this paper made great efforts to break through the basic theory and key technology of industrial control network space security and constructed power control system network intrusion and attack model. This model can accurately describe the implementation of the attacks,which provides a theoretical model for attack power industrial control system monitoring and early warning analysis.
作者 郭志民 吕卓 陈岑 Guo Zhimin;Lv Zhuo;Chen Cen(Electric Power Research Institute of State Grid Henan Electric Power Company, Zhengzhou 450052, Chin)
出处 《信息技术与网络安全》 2018年第3期37-39,44,共4页 Information Technology and Network Security
关键词 工控系统 网络入侵 攻击模型 行为特征分析 industrial control system network intrusion attack model behavior characteristics analysis
  • 相关文献

参考文献7

二级参考文献144

  • 1赵冬梅,张玉清,马建峰.网络安全的综合风险评估[J].计算机科学,2004,31(7):66-69. 被引量:23
  • 2博客园.Stuxnet蠕虫可能破坏了1000台伊朗离心机[EB/OL].
  • 3凤凰网.Stuxnet病毒拖后伊朗核计划两年[EB/OL].
  • 4安天实验室.对Stuxnet蠕虫攻击工业控制系统事件的综合报告[EB/OL].2010.
  • 5Symantec. W32.Stuxnet dossier version 1.3[EB/OL]. 2010.
  • 6赛迪网.2011年网络安全趋势预测:变化的世界要设防[EB/OL].
  • 7Computer Week. Stuxnet-like cyber attacks will prove a top trend m 2011, say experts[EB/OL]. 2011.
  • 8STOUFFER K,FALCE J,SCARFONE K.Guide to Industrial Control Systems(ICS)Security[EB/OL].[2011-6-22}.http://www.securityvibes.com/docs/DOC-1347.
  • 9BYRES E,ENG P.What Does Stuxnet Mean for Industrial Control System[EB/OL].[2011-6-22}.http://www.tofinosecurity.com/professional/what-does-stuxnet-mean-industrial-control-systems.
  • 10唐文.工业基础设施信息安全[R].[出版地不祥] :西门子中国研究院信息安全部,2011.

共引文献381

同被引文献43

引证文献6

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部