Research on risk assessment technology of industrial control system based on attack graph

被引:0
作者
Zou, Zhenwan [1 ]
Wang, Di [2 ]
Yang, Huiting [1 ]
Hou, Yingsa [3 ]
Yang, Yandong [1 ]
Xu, Wenlu [4 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Urumqi, Peoples R China
[2] State Grid Urumqi Power Supply Co, Urumqi, Peoples R China
[3] State Grid Xinjiang Maintenance Co, Urumqi, Peoples R China
[4] State Grid Bortala Power Supply Co, Urumqi, Peoples R China
来源
PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018) | 2018年
关键词
industrial control system; risk assessment; attack graph; Grey relational degree;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to evaluate the network security risks and implement effective defenses in industrial control system, a risk assessment method for industrial control systems based on attack graphs is proposed. Use the concept of network security elements to translate network attacks into network state migration problems and build an industrial control network attack graph model. In view of the current subjective evaluation of expert experience, the atomic attack probability assignment method and the CVSS evaluation system were introduced to evaluate the security status of the industrial control system. Finally, taking the centralized control system of the thermal power plant as the experimental background, the case analysis is performed. The experimental results show that the method can comprehensively analyze the potential safety hazards in the industrial control system and provide basis for the safety management personnel to take effective defense measures.
引用
收藏
页码:2420 / 2423
页数:4
相关论文
共 12 条
  • [1] [黄慧萍 Huang Huiping], 2015, [计算机应用研究, Application Research of Computers], V32, P3022
  • [2] [黄家辉 Huang Jiahui], 2016, [自动化学报, Acta Automatica Sinica], V42, P792
  • [3] Security assessment for industrial control systems based on fuzzy analytic hierarchy process
    Jia C.-Q.
    Feng D.-Q.
    [J]. Feng, Dong-Qin (dqfeng@iipc.zju.edu.cn), 1600, Zhejiang University (50): : 759 - 765
  • [4] Johnson R.E., 2010, INT TECHN SEC T ICIT, P1
  • [5] Scarfone K, 2009, EMP SOFTW ENG MEAS 2
  • [6] Sener E, 2013, HYDROGEOL J, V21, P701, DOI 10.1007/s10040-012-0947-y
  • [7] The use of principal component analysis and discriminant analysis in differential sensing routines
    Stewart, Sara
    Ivy, Michelle Adams
    Anslyn, Eric V.
    [J]. CHEMICAL SOCIETY REVIEWS, 2014, 43 (01) : 70 - 84
  • [8] Stouffer Keith, 2011, Security NIST Special Publication, V800, P16
  • [9] Vintr Z, 2012, INT CARN CONF SECU, P59, DOI 10.1109/CCST.2012.6393538
  • [10] Cyber Security Risk Assessment for Industrial Automation Platform
    Zheng, Yiling
    Zheng, Song
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 341 - 344