引用本文:孙子文,张炎棋.工业信息物理系统的攻击建模研究[J].控制与决策,2019,34(11):2323-2329
【打印本页】   【HTML】   【下载PDF全文】   查看/发表评论  【EndNote】   【RefMan】   【BibTex】 附件
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 47次   下载 57 本文二维码信息
码上扫一扫!
分享到: 微信 更多
工业信息物理系统的攻击建模研究
孙子文1,2, 张炎棋1
(1. 江南大学物联网工程学院,江苏无锡214122;2. 物联网技术应用教育部工程研究中心,江苏无锡214122)
摘要:
无线通信网络的脆弱性使得工业信息物理系统易遭受各类网络攻击.为了更深入地了解不同网络攻击的特征进而建立有效的防御措施,构建一种线性时不变离散系统的工业信息物理系统结构;深入研究信息物理系统攻击者攻击空间及攻击者攻击模型,采用控制理论方法研究攻击空间模型的模型知识、披露资源和破坏资源的数学表达;对拒绝服务攻击、重放攻击、虚假数据注入攻击3种典型网络攻击的基本特性,以及对应攻击下攻击模型的表现形式进行分析.通过Simulink/Truetime仿真工具对破坏性和隐蔽性性能进行仿真实验.结果表明,所研究的攻击空间模型及攻击者攻击模型能够有效地描述网络攻击的攻击特性.
关键词:  工业信息物理系统  模型知识  攻击策略  网络攻击  隐蔽性  异常检测器
DOI:10.13195/j.kzyjc.2018.1796
分类号:TP273
基金项目:国家自然科学基金项目(61373126);中央高校基本科研业务费专项资金项目(JUSRP51510);江苏省自然科学基金项目(BK20131107).
Research on attack modeling of industrial cyber physical systems
SUN Zi-wen1,2,ZHANG Yan-qi1
(1. School of Internet of Things Engineering,Jiangnan University,Wuxi214122,China;2. Engineering ResearchCenter of Internet of Things Technology Applications of MOE,Wuxi214122,China)
Abstract:
The fragility of wireless communication networks makes industrial cyber physical systems vulnerable to suffer various types of network attacks. In order to research the characteristics of different network attacks for establishing effective defense measures, this paper constructs an industrial cyber physical systems structure based on linear time-invariant discrete systems. The attack space and the attacker attack model of the cyber physics system are deeply studied. The control theory method is used to establish the mathematical expression of the model knowledge, disclosure resource and the broken resource. The basic characteristics of three typical network attacks, such as denial of service attack, replay attack and false data injection attack, and the manifestations of attack models under corresponding attacks are analyzed. Simulation experiments are conducted to evaluate the performance of destructiveness and concealment by using the Simulink/Truetime simulation tool. The simulation results show that the attack space model and the attacker attack model can effectively describe the attack characteristics of network attacks.
Key words:  industrial cyber physical systems  model knowledge  attack strategy  network attacks  stealthy  anomaly detector

用微信扫一扫

用微信扫一扫