节点文献

基于攻击意图的工业网络抗毁性评价研究

Research on resilience assessment of industrial wireless internet based on attack intention

  • 推荐 CAJ下载
  • PDF下载
  • 不支持迅雷等下载工具,请取消加速工具后下载。

【作者】 赵剑明曾鹏王天宇

【Author】 Zhao Jianming;Zeng Peng;Wang Tianyu;State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences;Key Laboratory of Networked Control Systems, Chinese Academy of Sciences;Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences;University of Chinese Academy of Sciences;

【机构】 中国科学院沈阳自动化研究所机器人学国家重点实验室中国科学院网络化控制系统重点实验室中国科学院机器人与智能制造创新研究院中国科学院大学

【摘要】 随着工业网络的迅猛发展,安全事件层出不穷,网络抗毁性成为了该领域关注的焦点之一。针对工业网络中的安全问题,以攻击意图为切入点,开展了工业网络抗毁性评价问题的研究。首先,通过对已知攻击案例的分析,识别了多种攻击类型及其潜在影响;然后,区别于现有针对网络系统本身特性的评价方法,将攻击的潜在意图纳入考量,构建了一个综合性的抗毁性评价方法;最后,在一个工业网络系统模型上,通过与现有流行的网络系统抗毁性评价方法对比,发现所提出的基于攻击意图的工业网络抗毁性评价方法具有更加客观、稳定的评估效果。该抗毁性评价方法综合考虑了外界攻击的意图、发生概率、影响范围以及可能的后果,有效刻画了不同场景下系统面对相同规模外界攻击时的抗毁性。

【Abstract】 With the rapid development of industrial wireless networks, security incidents are constantly emerging, and network survivability has become one of the focuses of attention in this field. This paper focuses on the security issues in industrial wireless networks, and takes attack intention as the starting point to conduct research on the evaluation of the resilience of industrial wireless networks. Firstly, by analyzing known attack cases, multiple types of attacks and their potential impacts are identified. Then, different from existing evaluation methods for the characteristics of network systems themselves, a comprehensive survivability evaluation method is constructed by taking into account the potential intent of the attack. Finally, on an industrial wireless network system model, by comparing it with existing popular network system survivability evaluation methods, it is found that the proposed attack intent based industrial wireless network survivability evaluation method in this paper has a more objective and stable evaluation effect. The survivability evaluation method proposed comprehensively considers the intention, probability of occurrence, scope of influence, and possible consequences of external attacks, effectively characterizing the survivability of systems facing the same scale of external attacks in different scenarios.

【基金】 国家重点研发计划(2021YFB2012400);辽宁省自然科学基金(2022-BS-030,2023JH2/101300202);中国科学院青年创新促进会(2023211);机器人学国家重点实验室自主课题(2022-Z13)
  • 【文献出处】 网络安全与数据治理 ,Cyber Security and Data Governance , 编辑部邮箱 ,2024年02期
  • 【分类号】TP393.08
  • 【下载频次】24
节点文献中: 

本文链接的文献网络图示:

本文的引文网络