信息网络安全 ›› 2014, Vol. 14 ›› Issue (8): 71-76.doi: 10.3969/j.issn.1671-1122.2014.08.013

• 技术研究 • 上一篇    下一篇

基于攻击树模型的数传电台传输安全性评估

李慧, 张茹, 刘建毅, 赵静   

  1. 北京邮电大学信息安全中心,北京 100876
  • 收稿日期:2014-06-19 出版日期:2014-08-01
  • 作者简介:李慧(1989-),女,辽宁,硕士研究生,主要研究方向:信息内容安全、工业控制安全;张茹(1976-),女,山东,副教授,博士,主要研究方向:多媒体安全、信息安全;刘建毅(1980-),男,山西,副教授,博士,主要研究方向:信息内容安全、灾难备份;赵静(1990-)女,天津,硕士研究生,主要研究方向:软件安全、内容安全、网络安全。
  • 基金资助:
    国家科技支撑计划[2012BAH08B02]、国家高技术研究发展计划[2012AA012606]、中央高校基本科研业务费专项资金[2013RC0310]、教育部科技发展中心网络时代科技论文快速共享专项研究课题[2013114]、数字版权研发工程项目[1681300000119]、北京高等学校青年英才计划[YETP0448]

Safety Assessment on Digital Radio Transmission based on Attack Tree Model

LI Hui, ZHANG Ru, LIU Jian-yi, ZHAO Jing   

  1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2014-06-19 Online:2014-08-01

摘要: 数传电台在数据采集与监视控制系统中广泛应用,其传输安全也受到越来越大的挑战。文章为了系统分析评估数据采集与监视控制系统中数传电台传输的安全性,针对数传电台传输阶段可能存在的风险,采用攻击树建模方法,对传统攻击树进行改进,重新定义了攻击节点,量化了叶子节点的攻击风险,建立了以威胁数据采集与监视控制系统安全为攻击目标的攻击树模型,在攻击树的基础上可以直观地反映各种可能的攻击图景。并根据攻击树计算出了各攻击图景发生的概率,根据多攻击图景考虑系统总的安全性。最后利用安全性灵敏度,定量分析各攻击方式发生概率变化对系统安全性的影响,找出对系统安全性影响较大的关键方式,提出提高系统安全水平的措施。文中攻击树模型可以用于评估系统风险,区分不同攻击方式对系统的不同安全威胁程度,由此为决策者采取相应的数传电台传输保护措施提供依据。

关键词: 攻击树, 数据采集与监视控制系统, 数传电台传输, 安全性评估, 攻击图景

Abstract: Digital radio is widely used in supervisory control and data acquisition system, and the transmission security is increasingly challenged. In order to systematically analyze and assess the digital radio transmission security in supervisory control and data acquisition system, this paper uses attack tree modeling method for the existing risk in the digital radio transmission stage, improves the traditional attack tree, refines attack nodes, quantifies the attack risk of leaf nodes, and establishes an attack tree model in which threats to the supervisory control and data acquisition system is the target. And it directly reflects the various possible attack picture based on the attack tree. This paper calculates the probability of the occurrence of each attack picture based on attack tree, and considers the overall safety of the system under various attack pictures. Finally, it analyzes quantitatively the impact of each change in the probability of attacks on the system security based on security sensitivity. And it identifies the key way which has a greater impact on system security, and proposes measures to improve the system security level. This attack tree model can be used to assess systemic risk and to distinguish different security threat levels of different attacks to the system, thus to provide a basis for decision-makers to take appropriate protective measures for the digital radio transmission.

Key words: attack tree, data acquisition and supervisory control system, digital radio transmission, safety assessment, attack picture

中图分类号: