期刊文献+

分层依赖关系建模的工控异常检测方法 被引量:1

Industrial control anomaly detection method with hierarchical dependency modeling
下载PDF
导出
摘要 为解决当前主流工控流量异常检测方法检测覆盖率较低的问题,分析这类检测方法的特点,综合考虑通信流量中流量层、数据包层及内容层3种影响因素,提出一种分层依赖关系建模的工控异常检测方法。使用流量、数据包以及内容3个层次的特征,通过并行LSTM神经网络构建不同层内数据间的依赖关系,建立粒度由粗到细的分层依赖关系模型,扩大流量特征建模的覆盖率,提升对工控异常流量的检测能力。实验结果表明,该方法检测精确率达到了96.9%,与不分层的模型相比检测精确率提高了7.2%。 To deal with the low detection coverage of most currently ICS traffic anomaly detection methods,the characteristics of such detection methods were analyzed,and three influencing factors of the traffic layer,the data packet layer and the content la-yer in communication traffic were also taken into consideration,and ICS anomaly detection based on hierarchical dependency modeling was proposed.Characteristics of the data flow layer,the packet layer and the content were used to build the dependencies among different layers of data through the parallel LSTM neural network,to establish a hierarchical dependency model with coarse-to-fine granularity,expand coverage of traffic feature modeling,and enhance the ability of detecting ICS abnormal traffic.Results of experimental evaluation show that the detection precision of this method reaches 96.9%,which is improved by 7.2%compared with that of the non-layered model.
作者 张壮壮 陈永乐 王建华 陈俊杰 ZHANG Zhuang-zhuang;CHEN Yong-le;WANG Jian-hua;CHEN Jun-jie(College of Information and Computer,Taiyuan University of Technology,Taiyuan 030024,China)
出处 《计算机工程与设计》 北大核心 2021年第6期1542-1550,共9页 Computer Engineering and Design
基金 山西省自然科学基金重点基金项目(201701D111002) 山西省自然科学基金青年基金项目(201601D021074)。
关键词 工控系统 异常检测 依赖关系 攻击模式 异常流量 ICS anomaly detection dependency attack mode abnormal traffic
  • 相关文献

参考文献3

二级参考文献69

  • 1周东华,孙优贤,席裕庚,张钟俊.一类非线性系统参数偏差型故障的实时检测与诊断[J].自动化学报,1993,19(2):184-189. 被引量:26
  • 2李渭华,萧德云,方崇智.一种基于自适应滑动窗格形滤波算法的故障检测器[J].自动化学报,1996,22(2):251-253. 被引量:7
  • 3袁云龙.基于组态软件的PLC控制系统仿真实现[J].自动化仪表,2006,27(5):57-58. 被引量:47
  • 4Stouffer K, Falco J, Scarfone K. SP 800--82 Guide to Industrial Control Systems ( ICS ) Security [S] Gaithersburg, MD: National Institute of Standards and Technology (NIST), 2011.
  • 5EricD.Knapp.工业网络安全:智能电网.SCADA和其他工业控制系统等关键基础设施的安全[M].周秦,郭冰逸,贺惠民,等译.北京:国防工业出版社,2014.
  • 6US Department of Homeland Security. Executive Order 13636--Improving Critical Infrastructure Cybersecurity [EB/OL]. [2015-05 -31]. http://www, dhs. gov/publication eo 13636-improving-cVcybersecurity Office of the Press Secretary, The White House.
  • 7Presidential Policy Directive--Critical Infrastructure Security and Resilience [EB/OI.]. [2015-05-313. http://www, whitehouse. gov/the-press office/2013/O2/12/presidential-policy-directive- critical-infrastructure seeurity-and-resil Industrial Control Systems Cyber Emergency Response Team.
  • 8ICS-CERT year in review 2013, 13-50369 [R/OL]. Arlington County, Virginia, USA: National Cyberseeurity and Communications Integration Center, 2013 [2015-05-31]. https ://ics-eert. us-cert, gov/ICS-CERT Year-Review-2013.
  • 9Cheminod M, Durante L, Valenzano A. Review of security issues in industrial networks [J]. IEEE Trans on Industrial Informatics, 2013, 9(1): 277-293.
  • 10OPC Foundation. OPC unified architecture specification [S]. Scottsdale, Arizona, USA: OPC Foundation, 2006.

共引文献79

同被引文献14

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部