期刊文献+

新型工业控制系统勒索蠕虫威胁与防御 被引量:10

Threat and defense of new ransomware worm in industrial control system
下载PDF
导出
摘要 工业控制系统(ICS)的大规模攻击对于电力生产、输配电、石油化工、水处理和传输等涉及国计民生的关键基础设施是一个巨大的威胁,目前提出的针对ICS的勒索蠕虫受限于工控网络隔离的特性,难以大规模传播。基于观察到的ICS实际开发场景,针对ICS高度隔离化的问题,提出一种基于新的攻击路径的勒索蠕虫威胁模型。此威胁模型首先将工程师站作为初次感染目标,然后以工程师站作为跳板,对处于内部网络的工业控制设备进行攻击,最后实现蠕虫式感染和勒索。基于此威胁模型,实现了ICSGhost——一种勒索蠕虫原型。在封闭的实验环境中,ICSGhost能够以预设的攻击路径对ICS进行蠕虫式感染;同时,针对该勒索蠕虫威胁,讨论了防御方案。实验结果表明此种威胁切实存在,并且由于其传播路径基于ICS实际的开发场景,较难检测和防范。 Industrial Control System(ICS) is widely used in critical infrastructure projects related to the national economy and people's livelihood such as power generation, transmission and distribution, petrochemical industry, water treatment and transmission. Large-scale attack on ICS is a huge threat to critical infrastructure. At present, the proposed ransomware worm for ICS is limited by the isolation characteristics of industrial control network, and it is difficult to spread on a large scale.Based on the observed actual development scene of ICS, in order to solve the problem of high isolation for ICS, a novel ransomware worm threat model with a new attack path was proposed. Firstly, the engineer station was taken as the primary infection target. Then, the engineer station was used as the springboard to attack the industrial control devices in the internal network. Finally, the worm infection and ransom were realized. Based on the proposed threat model, ICSGhost, which was a ransomware worm prototype, was implemented. In the closed experimental environment, ICSGhost can realize worm infection for ICS with a predetermined attack path. At the same time, for the ransomware worm threat, the defense plan was discussed.The experimental results show that such threat exists, and because its propagation path is based on the actual development scene of ICS, it is difficult to detect and guard against.
作者 刘煜堃 诸葛建伟 吴一雄 LIU Yukun 1, ZHUGE Jianwei 1 , WU Yixiong 1,2(1. Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China ;2. College of Mathematics and Computer Science, Fuzhou University, Fuzhou Fujian 350116, Chin)
出处 《计算机应用》 CSCD 北大核心 2018年第6期1608-1613,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(61472209) 清华大学国际科技合作项目(20163000227) 清华大学自主科研计划课题(20151080436)~~
关键词 工业控制系统 蠕虫 勒索软件 网络犯罪 安全威胁 Industrial Control System (ICS) worm ransomware cybercrime security threat
  • 相关文献

参考文献4

二级参考文献122

  • 1陈星,贾卓生.工业控制网络的信息安全威胁与脆弱性分析与研究[J].计算机科学,2012,39(S2):188-190. 被引量:29
  • 2电力二次系统安全防护规定[S].电监会5号令,2004.
  • 3国家信息化发展战略[S].中共中央和国务院办公厅,2006.
  • 4关于严禁用涉密计算机上国际互联网的通知[S].中保委4号,2003.
  • 5蔡东蛟.基于物理隔离的网络安全的实现[J].计算机安全,2007(11):46-49. 被引量:4
  • 6Stouffer K, Falco J, Scarfone K. Guide to Industrial Control Systems (ICS) Security, NIST: special publication 800- 82 [R]. 2011.
  • 7Falliere N, Murchu L O, Chien E. W32. Stuxnet dossier, Symantec white paper [R]. 2010.
  • 8Bencsdth B, Pek G, Buttydn L, et al. Duqu: A Stuxnet-like malware found in the wild [R/OL]. (2011-10). http:// www. crysys, hu/publications/files/bencsathPBFllduqu, pdf.
  • 9sKyWlper Analysis Team. sKyWlper (a. k.a. Flame a. k. a. Flamer) : A complex malware for targeted attacks [R/OL]. (2012 05). http://www, crysys, hu/skywiper/skywiper, pdf.
  • 10Caselli M, Had?iosmanovi? D, Zambon E, et al. On the feasibility of device fingerprinting in industrial control systems [C]// 8th International Workshop on Critical Information Infrastructures Security, CRITIS. 2013:155 - 166.

共引文献103

同被引文献68

引证文献10

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部