期刊文献+

基于HMM的工业控制系统网络安全状态预测与风险评估方法 被引量:8

Method of Network Security States Prediction and Risk Assessment for Industrial Control System Based on HMM
下载PDF
导出
摘要 文章通过隐马尔可夫模型(HMM)表征一个工业控制网络攻击场景的风险状态转移关系,通过风险状态与安全告警事件关联概率进行网络风险状态预测。文章定义了网络资产、威胁、脆弱性量化因子及其计算方式,对量化因子归一化处理并用于网络整体风险值分析。文章构建了基于典型4层工业控制系统结构的仿真环境,采用MATLAB对方法进行仿真验证。实验表明,文章方法可用于安全状态及风险值的动态评估过程。 In this paper,the Hidden Markov Model is used to characterize the risk state transition relationship of an industrial control network attack scene,and the network risk state is predicted by the correlation probability between the risk state and the security alarm event.This paper defines the quantitative factors of network assets,threats and vulnerability and their calculation methods,normalizes the quantitative factors and applies them to the analysis of the overall risk value of the network.This paper constructs a simulation environment based on the typical four-layer industrial control system structure,and simulates and verifies the method by MATLAB.Experimental results show that the proposed method can be used in the dynamic assessment process of security states and risk value.
作者 李世斌 李婧 唐刚 李艺 LI Shibin;LI Jing;TANG Gang;LI Yi(China Software Testing Center,Beijing 100048,China;China Academy of Information and Communications Technology,Beijing 100191,China)
出处 《信息网络安全》 CSCD 北大核心 2020年第9期57-61,共5页 Netinfo Security
基金 国家重点研发计划[2018YFB0803505]。
关键词 工业控制系统 网络安全状态 隐马尔可夫模型 industrial control system network security state Hidden Markov Model
  • 相关文献

参考文献5

二级参考文献44

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2龚俭,梅海彬,丁勇,魏德昊.多特征关联的入侵事件冗余消除[J].东南大学学报(自然科学版),2005,35(3):366-371. 被引量:13
  • 3郑贤斌,陈国明.基于SPA安全综合评价方法及其应用[J].哈尔滨工业大学学报,2006,38(2):290-293. 被引量:31
  • 4薛佩军,史开泉,卢昌荆.■-生成规律与系统规律识别[J].系统工程与电子技术,2007,29(1):53-56. 被引量:7
  • 5TCG Trusted Network Connect. TNC Architecture for In- teroperability Specification Version 1.4 Revision 4 [ EB/ OL]. (2009 - 05 - 18). http://www, t-rustedcomput- inggroup, org/files/resource_ files/51 F9691E-1 DO9- 3519-AD1 C1E27D285F03B/TN-C- Architecture_ vl _ 4_r4. pdf.
  • 6BASS T. Multisensor data fusion for next generation distributed intrusion detection systems [ C ]//Proceedings of the'99 IRIS National Sympon Sensor and Data Fusion. New York : Laurel, 1999 : 24 - 27.
  • 7BASS T. Intrusion detection systems & multisensor data fusion: Creating cyberspace situational awareness [ J]. Communications of the ACM, 2000, 43(4) : 99 - 105.
  • 8HALL D, LLINAS J. An introduction to muhisensor data fusion [J]. Proceedings of the IEEE, 1997, 85( 1 ) : 6 -23.
  • 9LAU S. The spinning cube of potential doom [ J ]. Communications of the ACM, 2004, 47 (6) : 25 - 26.
  • 10BLASCH E, PRIBILSKI M, DAUGHTERY B, et al. Fusion metrics for dynamic situation analysis [ C]//Kadar I, ed. Proceedings of the Signal Processing, Sensor Fusion, and Target Recognition XIII. Bellingham: SPIE, 2004 : 428 - 438.

共引文献417

同被引文献71

引证文献8

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部