信息网络安全 ›› 2018, Vol. 18 ›› Issue (10): 70-77.doi: 10.3969/j.issn.1671-1122.2018.10.010

• 技术研究 • 上一篇    下一篇

基于攻击图的工控网络威胁建模研究

陈瑞滢1(), 陈泽茂1, 王浩2   

  1. 1. 海军工程大学信息安全系,湖北武汉 430033
    2. 91910部队,辽宁大连 116001
  • 收稿日期:2018-05-09 出版日期:2018-10-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:陈瑞滢(1993—),女,浙江,硕士研究生,主要研究方向为信息安全;陈泽茂(1975—),男,福建,教授,博士,主要研究方向为网络安全、可信计算等;王浩(1988—),男,辽宁,硕士,主要研究方向为信息安全。

  • 基金资助:
    国家自然科学基金[61672531]

Research on Threat Modeling of Industrial Control Network Based on Attack Graph

Ruiying CHEN1(), Zemao CHEN1, Hao WANG2   

  1. 1. Information Security Department, Naval University of Engineering, Wuhan Hubei 430033, China
    2. 91910 Troops of PLA, Dalian Liaoning 116001, China
  • Received:2018-05-09 Online:2018-10-10 Published:2020-05-11

摘要:

工业控制系统中网络与计算机技术的应用已非常普遍,信息技术在工业控制系统的普及与应用使工业控制网络安全问题受到越来越广泛的关注。针对工业控制网络安全事件暴露出的脆弱性和漏洞等安全性问题,文章利用基于攻击水平提升的攻击图对工业控制网络威胁进行建模。首先介绍攻击图模型的形式化表示方法及攻击图生成步骤;然后举例描述工业控制网络中典型的攻击场景,并对攻击场景建立基于攻击水平提升的攻击图;最后借助攻击图开展安全性分析,预测攻击者最可能采取的攻击路径,得出工业控制网络的安全需求。实例分析表明,利用基于攻击水平提升的攻击图方法分析工业控制网络安全性能够得出攻击者最可能采取的攻击路径,为构建工业控制网络安全体系架构提供科学指导,具有良好的实用性。

关键词: 工业控制网络, 攻击图, 攻击建模, 攻击水平, 安全分析

Abstract:

Application of network and computer technology in industrial control network has been very common. The industrial control network security has been widely concerned followed by universal application of information technology. Security issues such as vulnerabilities have been exposed in industrial control network security incidents. In this paper, the attack graph based on the growth of attack level is used to model attack scenarios of the industrial control network. Firstly, the formal representation methods of the attack graph and attack graph generation procedure have been introduced. Next, the article describes the typical attack scenarios in the industrial control network as an example and build the attack graph based on the attack level growth for the attack scenarios. Furthermore, it uses the attack graph to analyze the security of the network, predict the attack path most likely to be taken by attackers, and to obtain the security requirements. The example shows that using the attack graph to analyze the network security of the warship platform network can provide scientific guidance for the constructing the industrial control network security architecture, and is practical in use.

Key words: industrial control network, attack graph, attach modeling, attack level, security analysis

中图分类号: