工业控制系统的漏洞风险评估方法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Method of vulnerability risk assessment for industrial control systems
  • 作者:顾兆军 ; 彭辉
  • 英文作者:GU Zhaojun;PENG Hui;College of Computer Science and Technology,Civil Aviation University of China;Information Security Assessment Center,Civil Aviation University of China;
  • 关键词:工业控制系统 ; 漏洞风险评估 ; 攻击图 ; 层次分析法 ; 风险值计算 ; 综合损失计算
  • 英文关键词:industrial control system;;vulnerability risk assessment;;attack graph;;analytic hierarchy process;;value-atrisk calculation;;comprehensive loss calculation
  • 中文刊名:XDDJ
  • 英文刊名:Modern Electronics Technique
  • 机构:中国民航大学计算机科学与技术学院;中国民航大学信息安全测评中心;
  • 出版日期:2019-07-15
  • 出版单位:现代电子技术
  • 年:2019
  • 期:v.42;No.541
  • 基金:国家自然科学基金(61601467);国家自然科学基金(U1533104);; 民航科技项目(MHRD20140205;MHRD20150233);; 民航安全能力建设项目(PDSA008);; 中央高校基本科研业务费中国民航大学专项(3122013Z008;3122013C004;3122015D025)~~
  • 语种:中文;
  • 页:XDDJ201914026
  • 页数:6
  • CN:14
  • ISSN:61-1224/TN
  • 分类号:120-124+128
摘要
针对当前ICS的漏洞风险分析忽略漏洞间关联关系的现状,提出一种新的ICS漏洞风险评估方法。该方法首先建立ICS攻击图模型;然后提出漏洞价值和漏洞利用概率两个指标,并结合ICS的安全属性和防御特征等给出指标的计算公式;接着,采用层次分析法,并兼顾组件特性和攻击者目的完成指标量化;最后,根据攻击图中漏洞之间的关联性计算出漏洞的实际利用概率和综合损失,进而完成漏洞风险值的计算。以民航某ICS为例进行实验分析,结果表明,该方法能够较为全面地评估ICS系统中漏洞的风险。
        In allusion to the current situation that the current vulnerability risk analysis of the ICS ignores the correlations between vulnerabilities,a method of new vulnerability risk assessment for the ICSs is proposed. In the method,the ICS attack graph model is established. Two indexes of vulnerability value and vulnerability utilization probability are put forward. The calculation formulas of the indexes are given combining the security attributes and defensive characteristics of the ICSs. The index quantification is completed by adopting the analytic hierarchy process and considering the component features and attacker′s purposes. The actual utilization probability and comprehensive loss of the vulnerabilities are calculated according to the correlations between vulnerabilities in the attack graph,so as to complete the calculation of vulnerability risk values. An experimental analysis was conducted taking a certain ICS of the civil aviation as an example. The results show that the method can comprehensively assess the vulnerability risk of the ICS.
引文
[1] CHEMINOD M,DURANTE L,VALENZANO A. Review of security issues in industrial networks[J]. IEEE transactions on industrial informatics,2013,9(1):277-293.
    [2] LANGNER R. Stuxnet:dissecting a cyberwarfare weapon[J].IEEE security&privacy,2011,9(3):49-51.
    [3]武文博,康锐,李梓.基于攻击图的信息物理系统信息安全风险评估方法[J].计算机应用,2016,36(1):203-206.WU Wenbo,KANG Rui,LI Zi. Attack graph based risk assessment method for cyber security of cyber-physical system[J]. Journal of computer applications,2016,36(1):203-206.
    [4]黄家辉,冯冬芹,王虹鉴.基于攻击图的工控系统脆弱性量化方法[J].自动化学报,2016,42(5):792-798.HUANG Jiahui,FENG Dongqin,WANG Hongjian. A method for quantifying vulnerability of industrial control system based on attack graph[J]. Acta automatica sinica,2016,42(5):792-798.
    [5]王作广,魏强,刘雯雯.基于攻击树与CVSS的工业控制系统风险量化评估[J].计算机应用研究,2016,33(12):3785-3790.WANG Zuoguang, WEI Qiang, LIU Wenwen. Quantitative risk assessment of industrial control systems based on attacktree and CVSS[J]. Application research of computers,2016,33(12):3785-3790.
    [6] HOMER J,ZHANG S,OU X,et al. Aggregating vulnerability metrics in enterprise networks using attack graphs[J]. Journal of computer security,2013,21(4):561-597.
    [7] NOEL S,JAJODIA S. Understanding complex network attack graphs through clustered adjacency matrices[C]//Proceedings of the 21th Annual Computer Security Applications Conference.Tucson:IEEE,2005:160-169.
    [8]蒋宁,林浒,尹震宇,等.工业控制网络的信息安全及纵深防御体系结构研究[J].小型微型计算机系统,2017,38(4):830-833.JIANG Ning,LIN Hu,YIN Zhenyu,et al. Research of security and defense-in-depth architecture of industrial control network[J]. Journal of Chinese computer systems,2017,38(4):830-833.
    [9] SHAKSHUKI E M,KANG N,SHELTAMI T R. EAACK:a secure intrusion-detection system for MANETs[J]. IEEE transactions on industrial electronics,2013,60(3):1089-1098.
    [10] BEAMER S,ASANOVI?K,PATTERSON D. Direction-optimizing breadth-first search[J]. Scientific programming,2013,21(3):137-148.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700