期刊文献+

虚拟化工控网络靶场的设计与自动化部署

Design and automatic deployment of virtual industrial control network range
下载PDF
导出
摘要 21世纪互联网的高速发展带动了工业信息化的革新,越来越多的工业控制系统由原先的封闭网络转入开放互联网络,在资源利用率和工作效率不断提升的同时,工业控制系统的脆弱性也逐渐暴露在公众视角中。工控安全研究起步晚,现有能应对网络化、信息化工控安全问题的人才储备不足。同时,由于工业控制系统的复杂性、专业性和封闭性,市场上可用于工控安全研究及测试的软硬件平台不多,且都普遍存在成本投入大、操作复杂、灵活性不高等问题。本文给出了一种基于虚拟化技术的工控网络靶场解决方案,利用OpenStack和Snort等系统,以低投入、低消耗的代价实现了工业控制场景的虚拟化仿真,使工控安全教育研究能在虚拟化平台上开展。 The rapid development of the Internet in the 21st century has led to the innovation of industrial informatization.More and more industrial control systems have been transferred from the original closed network to the open Internet.While the resource utilization rate and work efficiency have been continuously improved,the vulnerability of industrial control systems has been gradually exposed in the public perspective.The study of industrial control safety started late,and there are insufficient talents to deal with the problem of industrial control safety under network and informatization.At the same time,due to the complexity,professionalism and closure of the industrial control system,there are not many software and hardware platforms available for industrial control safety research and testing in the market,and there are widespread problems such as large cost input,complex operation and low flexibility.This paper presents an industrial control network range solution based on virtualization technology.OpenStack and Snort systems are used to realize the virtual simulation of industrial control scenarios at a low cost of investment and consumption,so that the research on industrial control safety education can be carried out on the virtualization platform.
作者 陈吉龙 翟健宏 CHEN Jilong;ZHAI Jianhong(College of computer science and technology,Harbin Institute of Technology,Harbin 15000,China)
出处 《智能计算机与应用》 2020年第5期56-62,66,共8页 Intelligent Computer and Applications
关键词 工控安全 网络靶场 OPENSTACK SNORT Industrial Control Security Cyber range Docker Snort
  • 相关文献

参考文献3

二级参考文献31

  • 1冯小安,祁兵.电力信息系统安全体系的构建[J].电网技术,2008,32(S1):77-80. 被引量:13
  • 2ENISA. Protecting industrial control systems [R]. Heraklion: Recommendations for Europe and Member States, 2012: 6-15.
  • 3GUO B, ZHANG D, WANG Z. Living with internet of things: the emergence of embedded intelligence [C]//Proc. of the 2011 1EEE International Conference on Cyber, Physical, and Social Computing. Dalian, China: 2011.
  • 4STOUFFER K, FALCO J, SCARFONE K. Guide to industrial control systems (ICS) security IS]. American: NIST, 2011.
  • 5RALSTON P A S. Cyber seeurity risk assessment for SCADA and DCS networks[C]//ISA Transactions 46, 2007: 583-594.
  • 6JOYE M. Fast point multiplication on elliptic curves without precomputation [C]//Proc of the 2nd International Workshop on Arithmetic of Finite Fields. 2008.
  • 7Bouchti A E, Haqiq A. Modeling cyber-attack for SCADA systemsusing CoPNet approach [ C ] //Proc of International Symposium on Se-curity and Safety of Complex Systems. 2012:125-133.
  • 8Schneier B. Attack trees[ J]. Dr. Dobb’ s Journal of SoftwareTools,1999,24(12) :21-29.
  • 9Ten C W, Liu C C, Govindarasu M. Vulnerability assessment of cyber-security for SCADA system using attack trees [ C]//Proc of IEEE Con-ference on Power Engineering Society General Meeting. 2007:1-8.
  • 10Park G Y, Lee C K, Choi J G, ei al. Cyber security analysis by at-tack trees for a reactor protection system [ C]//Proc of Korean Nucle-ar Society (KNS) Fall Meeting. 2008 ; 268-279.

共引文献132

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部