期刊文献+

一种基于格式保持加密的高安全S7-400工控蜜罐构建方法 被引量:3

A high-security S7-400 industrial control honeypot construction method based on format-preserving encryption
下载PDF
导出
摘要 工业控制系统蜜罐存在系统信息容易被攻击者嗅探,安全性不能满足要求的问题。针对此问题,提出一种改进的Conpot蜜罐方案,针对Conpot蜜罐设计时存在指纹信息的缺陷,对配置文件中序列号等指纹进行擦除和替换,并依据实际PLC指纹对蜜罐XML配置文件重新配置以仿真S7-400设备。为使生成序列号与真实PLC在面对攻击者扫描时格式一致,在对PLC命名规则分析基础上,采用格式保持加密算法进行相关字段的生成,从而提高安全性。验证了所提方案可有效提高Conpot蜜罐的安全性。 Honeypot is an active defense technology,which can make up for the low efficiency of the unknown threat detection system.It is of great importance to the security of industrial control systems.Currently,the ICS honeypot has the deficiency that system information can be easily sniffed by attackers.Addressing the problem,an improved honeypot scheme based on Conpot is proposed.In the proposed scheme,the fingerprints are erased and replaced in the configuration file to address the shortcomings of the fingerprint information in the Conpot honeypot.And then the XML configuration file is reconfigured to emulate the S7-400 device based on the actual programmable logic controllers fingerprints.Further,in order to make the generated sequence number consistent with the format of the real PLC in the face of the attacker’s scan,the format-preserving encryption algorithm is introduced.The proposed scheme is experimentally verified to be effective in improving the safety of the Conpot honeypot.
作者 崔永富 翟江涛 林鹏 许历隆 CUI Yongfu;ZHAI Jiangtao;LIN Peng;XU Lilong(School of Electronic & Information Engineering, Nanjing University of Information Science & Technology, Nanjing 210044, China)
出处 《重庆理工大学学报(自然科学)》 CAS 北大核心 2022年第4期170-176,共7页 Journal of Chongqing University of Technology:Natural Science
基金 国家自然科学基金项目(U1836104,61801073,61931004,62072250) 南京信息工程大学人才引进启动基金项目(2020r061)。
关键词 蜜罐 Conpot 格式保持加密 工业控制系统 honeypot Conpot format-preserving encryption industrial control system24
  • 相关文献

参考文献3

二级参考文献53

  • 1程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 2曹爱娟,刘宝旭,许榕生.网络陷阱与诱捕防御技术综述[J].计算机工程,2004,30(9):1-3. 被引量:27
  • 3Radhakrishnan R, Kharrazi M, Memon N. Data masking: A new approach for steganography? The Joumal of VLSI Signal Processing, 2005,41 (3):293-303. [doi: 10.1007/s 11265-005-4153-1 ].
  • 4Smith HE, Brightwell M. Using datatype-preserving encryption to enhance data warehouse security. In: Proc. of the 20th National Information Systems Security Conf. 1997. 141 - 149. http://csrc.nist.gov/nissc/1997/proceedings/141.pd.
  • 5National Bureau of Standards. FIPS PUB 74, Guidelines for Implementing and Using the NBS Data Encryption Standard, 1981. B.
  • 6lack J, Rogaway P. Ciphers with arbitrary finite domains. In: Preneel B, ed. Proc. of the Topics in Cryptology--CT-RSA 2002. LNCS 2271, San Jose: Springer-Verlag, 2002. 114-130. [doi: 10.1007/3-540-45760-7_9].
  • 7Luby M, Rackoff C. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal of Computing, 1988,17(2):373-386. [doi: 10.1137/0217022].
  • 8Patarin J. Security of random Feistel schemes with 5 or more rounds. In: Franklin M, ed. Advances in Cryptology--CRYPTO 2004. LNCS 3152, Santa Barbara: Springer-Verlag, 2004.106-122. http://www.iacr.org/archive/crypto2004/31520105/Version%20courte %20Format%20Springer.pdf [doi: 10.1007/978-3-540-28628-8_7].
  • 9Spies T. Format preserving encryption. Unpublished Voltage White Paper. 2008. https://www.voltage.com/pdf/Voltage-Security- WhitePaper-Format-Preserving-Encryption.pdf.
  • 10Spies T. Feistel finite set encryption mode. 2008. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ffsem/ ffsem-spee.pdf.

共引文献101

同被引文献28

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部