期刊文献+

面向工业嵌入式设备的漏洞分析方法研究 被引量:8

Study on the Vulnerability Analysis Method for Industrial Embedded Devices
下载PDF
导出
摘要 目前现役和在售的嵌入式电子设备大多处于不设防状态,系统安全面临威胁。针对工业嵌入式设备自身防护能力较弱的特点,以PLC为例说明嵌入式设备存在的漏洞风险。设计了石化液位控制系统,演示了工业病毒利用漏洞进行攻击的方法与途径。设计了漏洞分析系统,包括工业协议状态模型、未知漏洞挖掘、已知漏洞扫描、漏洞识别模型、安全评估分析和监测与控制等六个部分,为工业控制系统漏洞分析系统开发提供了理论方法。 At present,most of the embedded electronic devices,active duty or commercial available,are in undefended state,the system security is facing threats. In accordance with the feature of industrial embedded devices,i. e.,the self-protection capability is weak,the vulnerability risks exist in embedded devices are described with PLC as example. The level control system for petrochemical industry is designed,and the attack method and path of industrial viruses through loopholes are demonstrated. The vulnerability analysis system is designed,including six parts: industrial protocol state model,unknown vulnerability mining,known vulnerability scanning,vulnerability identification model,security evaluation analysis and monitoring and control; it provides theoretical method for developing vulnerability analysis system of industrial control systems.
出处 《自动化仪表》 CAS 2015年第10期63-67,71,共6页 Process Automation Instrumentation
基金 国家863高技术研究发展计划基金资助项目(编号:2015AA043901-01)
关键词 工业嵌入式设备 漏洞分析 PLC 工业病毒 安全测试 Industrial embedded device Vulnerability analysis PLC Industrial virus Security test
  • 相关文献

参考文献19

  • 1彭勇,江常青,谢丰,戴忠华,熊琦,高洋.工业控制系统信息安全研究进展[J].清华大学学报(自然科学版),2012,52(10):1396-1408. 被引量:177
  • 2IE C 6 2 4 4 3 Network and system secu rity for in du strial - p ro cessm easurem ent and con trol[S] . 2 0 1 2 .
  • 3蒲石,陈周国,祝世雄.震网病毒分析与防范[J].信息网络安全,2012(2):40-43. 被引量:44
  • 4The N ation al R esearch C oun cil. M aking the nation s a fe r : the role ofscien ce an d technology in countering terrorism [R] . W ashingtonD C , U S A : the N ational R esearch C o u n cil, 2 0 0 2 .
  • 5U nited States G eneral A ccou ntin g O ffice. C ritical infrastructureprotection : ch allen ges and efforts to secu re control sy stem s, G AO -0 4 - 3 5 4 [R] . W ashington D C , U S A : G eneral A ccou ntin g O ffice( G A O ) , 2 0 0 4 .
  • 6E isen h au er J , D onnelly P , E llis M , et al. R o ad m ap to secu recontrol system s in the energy sector [R] . W ashington D C , U S A :E n ergetic In corp orated , the U S D epartm ent o f Energy an d the U SD epartm ent o f H om eland S ecu rity , 2 0 0 6 .
  • 7D epartm ent o f H om eland Security. N ation al infrastructure protectionp lan [R] . W ashington D C , U S A : D epartm ent o f H om elandS ecu rity , 2 0 0 9 .
  • 8E nergy Sector Control System s W orking G roup ( E SC SW G ) .R oadm ap to ach ieve energy delivery system s cyber security [R] .W ashington D C , U S A : O ffice o f E lectricity D elivery and EnergyR e liab ility , 2 0 1 1 .
  • 9Com m ission o f the E uro p ean C o m m u n ities, Com m unication from theCom m ission to the C oun cil and the E u ropean P arliam en t. C riticalinfrastructure protection in the fight again st terrorism , COM ( 2 0 0 4 )7 0 2 fin al [R] . B r u s s e ls , B elgiu m : C om m ission o f the E u rop eanco m m u n icaties, 2 0 0 4 .
  • 10Com m ission o f the E uro p ean C om m unities. Com m unication from thecom m ission on a european program m e for critical infrastructurep rotection , COM ( 2 0 0 6 ) 7 8 6 F in al [R] . B r u sse ls, B e lg iu m :Com m ission o f the E u ropean co m m u n icaties, 2 0 0 6 .

二级参考文献107

  • 1David Helan. Stuxnet: analysis,myths and realities [J].Actusecu 27,2010:14-23.
  • 2Amr Thabet.Stuxnet_Malware_Analysis_Paper[J].Freelancer Malware Researcher, 2010: 3-28.
  • 3Nicolas Falliere, Liam O Murchu, Eric Chien.W32.Stuxnet Dossier[R]. Symantec company, 2011.16-38.
  • 4Matrosov, Rodionov.StuxnetZUnder the Microscope 1.3[R]. ESET Company, 2010.24-65,.
  • 5Mark Russinovich. Analyzing a Stuxnet Infection with the Sysintemals Tool[EB/OL]. http://blogs.technet.com/b/markrussinovich/archive/2011 /03/30/3416253.aspx, 2010.
  • 6安天实验室对Stuxnet蠕虫攻击工业控制系统事件的综合报告[R].安全实验室,2010.4-11.
  • 7NIST SP800-82.Guide to Industrial Control Systems(ICS)Security[S].Gaithersburg,USA:National Institute of Standards and Technology(NIST),2011.
  • 8Simon H A.The architecture of complexity[C] //Proceedings of the American Philosophical Society.Philadelphia,USA:Batsford,1962:467-482.
  • 9Bishop M.Computer Security[M].Boston,USA:Addison Wesley,2003.
  • 10Department of Homeland Security(DHS).Cyber Security Assessments of Industrial Control System[S].Washington DC,USA:Department of Homeland Security(DHS),2010.

共引文献223

同被引文献63

引证文献8

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部