关键基础设施网络安全技术研究进展
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research on network security of critical infrastructure: a survey
  • 作者:夏卓群 ; 朱培栋 ; 欧慧 ; 戴傲 ; 范开钦 ; 许曼琳
  • 英文作者:XIA Zhuo-qun;ZHU Pei-dong;OU Hui;DAI Ao;FAN Kai-qin;XU Man-lin;School of Computer & Telecommunication Engineering,Changsha University of Science & Technology;College of Computer,National University of Defense Technology;The State Taxation Bureau of Hunan Province;
  • 关键词:关键基础设施 ; 信息物理融合系统 ; CPS安全 ; 信息物理攻击
  • 英文关键词:critical infrastructure;;cyber physical system(CPS);;CPS security;;cyber-physical attacks
  • 中文刊名:JSYJ
  • 英文刊名:Application Research of Computers
  • 机构:长沙理工大学计算机与通信工程学院;国防科学技术大学计算机学院;湖南省国家税务局;
  • 出版日期:2014-08-27 09:42
  • 出版单位:计算机应用研究
  • 年:2014
  • 期:v.31;No.278
  • 基金:国家自然科学基金资助项目(61170285);; 湖南省自然科学基金资助项目(14JJ7043);; 湖南省交通运输厅科技进步与创新项目(201405)
  • 语种:中文;
  • 页:JSYJ201412003
  • 页数:4
  • CN:12
  • ISSN:51-1196/TP
  • 分类号:17-20
摘要
通过对关键基础设施的网络安全现状进行总结,对关键基础设施的安全威胁进行了分类,着重对信息物理融合系统在受到网络攻击时采用的数据词典、证据理论、博弈论等方法进行网络安全防护深入分析,着重分析了基于信任理论的信息物理融合系统的防御方案,阐述了关键基础设施的相关性与脆弱性之间的关系,总结了现有主要的关键基础设施网络安全的模拟技术,对比分析了现有的仿真技术的特点。最后提出了关键基础设施网络安全技术值得深入研究的发展方向。
        This paper summarized the network security situation on critical infrastructure,it classified security threats to critical infrastructure. By focusing on the CPS in the network attack,it introduced the data dictionary,evidence theory,game theory analysis,the network security protection. It emphasized the analysis of the defense scheme cyber physical system based on the theory of trust,and studied the relation between the correlation and vulnerability of critical infrastructure. It summarized the network security simulation technologies of critical infrastructure present,and compared the simulation technologies. It put forward the future direction of development of critical infrastructure network security technology.
引文
[1]DAS S K,KANT K,ZHANG Nan.Handbook on securing cyber-physical critical infrastructure[M].[S.l.]:Morgan Kaufmann,2012.
    [2]AMIN S,SCHWARTZ G A,HUSSAIN A.In quest of benchmark security risks to cyber-physical systems[J].IEEE Network,2013,27(1):19-24.
    [3]HUSSAIN A,HEIDEMANN J,PAPADOPOULOS C.A framework for classifying denial of service attacks[C]//Proc of ACM Conference Applications,Technologies,Architectures,and Protocols for Computer Communications.2003:99-110.
    [4]AMIN S,LITRICO X,SASTRY S S,et al.Cyber security of water SCADA systems—partⅡ:attack detection using enhanced hydrodynamic models[J].IEEE Trans on Control Systems Technology,2012,21(5):1679-1693.
    [5]BULDYREV S V,PARSHANI R,PAUL G,et al.Catastrophic cascade of failures in interdependent networks[J].Nature,2010,464(7291):1025-1028.
    [6]YAMPOLSKIY M,HORVATH P,KOUTSOUKOS X D,et al.Systematic analysis of cyber-attacks on cps-evaluating applicability of DFDbased approach[C]//Proc of the 5th International Symposium on Resilient Control Systems.2012:55-62.
    [7]WHEELER D A,LARSON G.Techniques for cyber attack attribution,IDA Paper P-3792[R].Alexandria,Virginia:Institute for Defense Analyses,2003.
    [8]HUNKER J,UTCHINSON R,MARGULIES J.Attribution of cyber attacks on process control systems[J].Critical Infrastructure ProtectionⅡ,The International Federation for Information Processing,2009,290:87-99.
    [9]DYNES S.Emergent risks in critical infrastructures[J].Critical Infrastructure ProtectionⅡ,The International Federation for Information Processing,2009,290:1-16.
    [10]STELTE B,RODOSEK G D.Assuring trustworthiness of sensor data for cyber-physical systems[C]//Proc of IFIP/IEEE International Symposium on Integrated Network Management.2013:395-402.
    [11]AAKASH S,ADRIAN P,BRUNO S.Mechanisms to provide integrity in SCADA and PCS devices[C]//Proc of International Workshop on Cyber-Physical Systems Challenges and Applications.2008.
    [12]FOGLIETTA C,GASPARRI A,PANZIERI S.A networked evidence theory framework for critical infrastructure modeling[J].Critical Infrastructure ProtectionⅥ,IFIP Advances in Information and Communication Technology,2012,390:205-215.
    [13]GASPARRI A,FIORINI F,DiROCCO M,et al.A networked transferable belief model approach for distributed data aggregation[J].IEEE Trans on Systems,Man and Cybernetics:Part B,2012,42(2):391-405.
    [14]OKHRAVI H,NICOL D.Applying trusted network technology to process control systems[J].Critical Infrastructure ProtectionⅡ,The International Federation for Information Processing,2009,290:57-70.
    [15]BAINA A,El KALAM A A,DESWARTE Y,et al.Collaborative access control for critical infrastructures[J].Critical Infrastructure ProtectionⅡ,The International Federation for Information Processing,2009,290:189-201.
    [16]MIEGE A.Definition of a formal framework for specifying security policies:the Or BAC model and extensions[D].Paris:Ecole Nationale Superieure des Telecommunications,2005.
    [17]El KALAM A A,BENFERHAT S,MIEGE A,et al.Organization based access control[C]//Proc of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks.2003:120-134.
    [18]TOTEL E,BLANQUART J,DESWARTE Y,et al.Supporting multiple levels of criticality[C]//Proc of the 28th Annual Symposium on Fault Tolerant Computing.1998:70-79.
    [19]CASALICCHIO E,GALLI E.Metrics for quantifying interdependencies[J].Critical Infrastructure ProtectionⅡ,The International Federation for Information Processing,2009,290:215-227.
    [20]MENDONCA D,LEE E,WALLACE W.Impact of the 2001 World Trade Center attack on critical interdependent infrastructures[C]//Proc of IEEE International Conference on Systems,Man and Cybernetics.2004:4053-4058.
    [21]MIN H,BEYELER W,BROWN T,et al.Toward modeling and simulation of critical national infrastructure interdependencies[J].IIE Transactions,2007,39(1):57-71.
    [22]RINALDI S,PEERENBOOM J,KELLY T.Identifying,understanding and analyzing critical infrastructure interdependencies[J].IEEE Control Systems,2001,21(6):11-25.
    [23]SVENDSEN N K,WOLTHUSEN S D.Connectivity models of interdepen-dency in mixed-type critical infrastructure networks[J].Information Security Technical Report,2007,12(1):44-55.
    [24]NIEUWENHUIJS A,LUIIJF E,KLAVER M.Modeling dependencies in critical infrastructures[J].Critical Infrastructure ProtectionⅡ,The International Federation for Information Processing,2009,290:205-213.
    [25]SETOLA R,BOLOGNA S,CASALICCHIO E,et al.An integrated approach for simulating interdependencies[J].Critical Infrastructure ProtectionⅡ,The International Federation for Information Processing,2009,290:229-239.
    [26]IRRIIS Consortium,The IRRIIS European Integrated Project.Fraunhofer institute for intelligent analysis and information systems[EB/OL].http://www.irriis.org.
    [27]DIESIS Consortium.The DIESIS project[EB/OL].http://www.diesis-eu.org.
    [28]刘健,刘晓,吴之立.网络化关键基础设施依存关系建模与仿真方法研究[J].中国安全科学学报,2011,21(10):29-35.
    [29]周军学,易立新.网络重要基础设施脆弱性评价模型及其应用[J].中国安全科学学报,2010,20(11):72-80.
    [30]SIATERLIS C,GENGE B,HOHENADEL M,et al.Enabling the exploration of operating procedures in critical infrastructures[J].Critical Infrastructure ProtectionⅥ,IFIP Advances in Information and Communication Technology,2012,390:217-233.
    [31]CRAVEN P,OMAN P.Simulation of advanced train control systems[J].Critical Infrastructure ProtectionⅡ,The International Federation for Information Processing,2009,290:243-256.
    [32]TOLONE W,LEE S W,XIANG Wei-ning,et al.An integrated methodology for critical infrastructure modeling and simulation[J].Critical Infrastructure ProtectionⅡ,The International Federation for Information Processing,2009,290:257-268.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700