期刊文献+

卷接设备IPC控制系统网络安全监测模型的构建 被引量:5

Configuration of network security monitoring model for IPC control system of filtered cigarette maker
下载PDF
导出
摘要 为解决卷接设备IPC控制系统因内部缺失防护措施而存在安全隐患等问题,通过分析IPC(Industrial Personal Computer)控制系统的安全漏洞和攻击路径,采用构建控制系统典型攻击链模型的方法,设计了系统网伪控制指令安全监测、IPC控制器非侵入式安全监测、控制网异常控制行为安全监测3个安全监测模块,结合数据无扰采集和安全风险预警技术,构建了能够覆盖卷接设备核心控制设备和通信网络的A3MA(Acquisition-Monitoring-Monitoring-Monitoring-Alarm)安全监测模型。以ZJ17E卷接机组的IPC控制系统为对象进行测试,结果表明:A3MA安全监测模型能够快速发现系统网伪控制指令行为,快速定位针对IPC控制器的未授权篡改行为,快速识别EtherCAT控制网的异常控制行为。该模型可为实现卷接设备IPC控制系统的多层安全监测提供技术支持。 In order to overcome the hidden security troubles in the IPC control system of filtered cigarette maker in the absence of internal protection measures,the security holes and attacked routes of the IPC control system were analyzed and three security monitoring modules were designed by means of developing a typical attack chain model for the control system.The first module was designed for the security monitoring of pseudo instruction of the system network.The second module was designed for the non-intrusive security monitoring of the IPC controller,and the third module was designed for monitoring the abnormal control behavior of the control network.Thereby,an A3MA(Acquisition-Monitoring-Monitoring-Monitoring-Alarm)security monitoring model,which covered the IPC core controller and core communication network of the cigarette maker was configured by integrating with disturbance-free data acquisition and security risk early-warning.The security monitoring model was tested on an IPC control system in a ZJ17E cigarette maker,the results showed that the A3MA security monitoring model could rapidly discern the behaviors of pseudo-control instructions in the system network,rapidly locate the unauthorized tampering behaviors targeting IPC controller and rapidly identify the abnormal control behaviors of EtherCAT control network.This model provides a technical support for the multi-layer security monitoring of IPC control system in filtered cigarette maker.
作者 倪雄军 李健俊 李钰靓 文德明 姜学峰 张益南 李威 张晓东 NI Xiongjun;LI Jianjun;LI Yuliang;WEN Deming;JIANG Xuefeng;ZHANG Yinan;LI Wei;ZHANG Xiaodong(Production Management Department,China Tobacco Zhejiang Industrial Co.,Ltd.,Hangzhou 310008,China;Information Center,China Tobacco Zhejiang Industrial Co.,Ltd.,Hangzhou 310008,China;Hangzhou Cigarette Factory,China Tobacco Zhejiang Industrial Co.,Ltd.,Hangzhou 310008,China;Changde Tobacco Machinery Co.,Ltd.,Changde 415000,Hunan,China;Hangzhou UWNTEK Automation System Co.,Ltd.,Hangzhou 311107,China)
出处 《烟草科技》 CAS CSCD 北大核心 2022年第1期99-106,共8页 Tobacco Science & Technology
基金 浙江中烟工业有限责任公司科技项目“卷接设备电控系统深度安全技术研究与应用”(ZJZY2020E002)。
关键词 卷接设备 IPC控制系统 安全漏洞 攻击路径 A3MA安全监测模型 Filtered cigarette maker IPC control system Security hole Attacking route A3MA security monitoring model
  • 相关文献

参考文献7

二级参考文献121

  • 1NIST SP800-82.Guide to Industrial Control Systems(ICS)Security[S].Gaithersburg,USA:National Institute of Standards and Technology(NIST),2011.
  • 2Simon H A.The architecture of complexity[C] //Proceedings of the American Philosophical Society.Philadelphia,USA:Batsford,1962:467-482.
  • 3Bishop M.Computer Security[M].Boston,USA:Addison Wesley,2003.
  • 4Department of Homeland Security(DHS).Cyber Security Assessments of Industrial Control System[S].Washington DC,USA:Department of Homeland Security(DHS),2010.
  • 5The European Network and Information Security Agency(ENISA).Protecting Industrial Control Systems,Recommendations for Europe and Member States[R].Heraklion,Greece:Recommendations for Europe and Member States,2011.
  • 6Byres E J,Kay J,Carter J.Myths and facts behind cyber security and industrial control(2003)[Z/OL].(2010-02-12),http://www.pimaweb.org/conference/april2003/pdfs/MythsAndFactsBehindCyberSecurity.pdf.
  • 7David A.Multiple Efforts to Secure Control Systems Are Under Way,but Challenges Remain,GAO-07-1036[R].Washington DC,USA:US Government Accountability Office(US GAO),2007.
  • 8IEC61508.Functional Safety of E/E/PE Safety-Related Systems[S].Geneva,Switzerland:International Electrotechnical Commission(IEC),2000.
  • 9Piètre-Cambacédès L,Chaudet C.The SEMA referential framework:Avoiding ambiguities in the terms“security”and“safety”[J].International Journal of Critical Infrastructure Protection,2010,3(2):55-66.
  • 10NIST906330.Security Assurance Levels:A Vector Approach to Describing Security Requirements[S].Gaithersburg,USA:National Institute of Standards and Technology(NIST),2010.

共引文献227

同被引文献52

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部