期刊文献+

基于零动态的工控系统攻击检测识别安全模型 被引量:5

Industrial Control System Security Model of Attack Detection and Identification Based on Zero Dynamics
下载PDF
导出
摘要 工控系统的物理基础设施、数据管理层和通信层易受网络攻击,而由于现代工业网络的特性,典型的信息安全方法无法满足其安全要求。为此,研究现代工控系统协议以及常见安全威胁,建立一个针对受攻击系统的统一建模框架,并设计集中式和分布式的过滤器。通过分析应用环境和筛选特征识别结果,识别欺骗、拒绝服务、隐秘、重放和隐蔽等典型的攻击和异常。实验结果表明,该模型能够增强工控系统的抗噪性和鲁棒性。 The physical infrastructure, the data management lay and the communication layer of Industrial Control System (ICS) are vulnerable to the network attacks,but due to the characteristics of modern industrial network, the typical information security methods cannot meet its security requirements. Through the research of modern ICS protocols and common security threats,this paper establishes a common modeling framework for ICS under attacks and designs centralized and distributed filters. By analyzing the application environment and filtering the feature recognition results, the identifications of typical attacks and anomalies are implemented, such as spoofing, denial of service, secret, covert playback and so on. Simulation results show that the proposed model can enhance the noise immunity and robstness of ICS.
作者 张环宇 陈凯
出处 《计算机工程》 CAS CSCD 北大核心 2017年第10期98-103,共6页 Computer Engineering
基金 工业和信息化部电子信息产业发展基金(财建[2013]757号)
关键词 工控系统 安全模型 攻击检测 攻击识别 零动态 Industrial Control System (ICS) security model attack detection attack identification zero dynamics
  • 相关文献

参考文献5

二级参考文献86

  • 1SAATY TL . The Analytic Hierarchy Process [ M ] . New York :McGraw-Hill Inco, 1980.
  • 2ISO/IEC 17799:2000.信息技术·信息安全管理实用规则[S].
  • 3GB 17859:1999计算机信息系统·安全保护等级划分规则[S].
  • 4G13/T 18336:2001.信息技术、安全技术·信息技术安全性评估准则[S].
  • 5CB/T 19715:2005.信息技术·信息技术安全管理指南[S].
  • 6Nicholson A, WebberS, Dyer S,et al. SCADA security in the light of Cyber-Warfare[J]. Computers & Security, 2012, 31(4), 418-436.
  • 7Alcaraz, C., Fernandez, G., & Carvajal, F. (2012). Security aspects of SCADA and DCS environments. In Critical Infrastructure Protection (pp. 120-149). Springer Berlin Heidelberg.
  • 8Stouffer, K., Falco, J., & Scarfone, K. (2008). Guide to industrial control systems (ICS) security. NIST Special Publication, 800, 82.
  • 9Wang, Y. (2012). sSCADA: Securing SCADA infrastructure communications.arXiv preprint arXiv:1207.5434.
  • 10C d rdenas, A. A., Amin, S., & Sastry, S. (2008, July). Research challenges for the security of control systems. In Proceedings of the 3rd conference on Hot topics in security (pp. 1-6). USENIX Association.

共引文献122

同被引文献35

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部