工业信息物理系统的攻击建模研究
CSTR:
作者:
作者单位:

(1. 江南大学物联网工程学院,江苏无锡214122;2. 物联网技术应用教育部工程研究中心,江苏无锡214122)

作者简介:

通讯作者:

E-mail: sunziwen@jiangnan.edu.cn.

中图分类号:

TP273

基金项目:

国家自然科学基金项目(61373126);中央高校基本科研业务费专项资金项目(JUSRP51510);江苏省自然科学基金项目(BK20131107).


Research on attack modeling of industrial cyber physical systems
Author:
Affiliation:

(1. School of Internet of Things Engineering,Jiangnan University,Wuxi214122,China;2. Engineering ResearchCenter of Internet of Things Technology Applications of MOE,Wuxi214122,China)

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    无线通信网络的脆弱性使得工业信息物理系统易遭受各类网络攻击.为了更深入地了解不同网络攻击的特征进而建立有效的防御措施,构建一种线性时不变离散系统的工业信息物理系统结构;深入研究信息物理系统攻击者攻击空间及攻击者攻击模型,采用控制理论方法研究攻击空间模型的模型知识、披露资源和破坏资源的数学表达;对拒绝服务攻击、重放攻击、虚假数据注入攻击3种典型网络攻击的基本特性,以及对应攻击下攻击模型的表现形式进行分析.通过Simulink/Truetime仿真工具对破坏性和隐蔽性性能进行仿真实验.结果表明,所研究的攻击空间模型及攻击者攻击模型能够有效地描述网络攻击的攻击特性.

    Abstract:

    The fragility of wireless communication networks makes industrial cyber physical systems vulnerable to suffer various types of network attacks. In order to research the characteristics of different network attacks for establishing effective defense measures, this paper constructs an industrial cyber physical systems structure based on linear time-invariant discrete systems. The attack space and the attacker attack model of the cyber physics system are deeply studied. The control theory method is used to establish the mathematical expression of the model knowledge, disclosure resource and the broken resource. The basic characteristics of three typical network attacks, such as denial of service attack, replay attack and false data injection attack, and the manifestations of attack models under corresponding attacks are analyzed. Simulation experiments are conducted to evaluate the performance of destructiveness and concealment by using the Simulink/Truetime simulation tool. The simulation results show that the attack space model and the attacker attack model can effectively describe the attack characteristics of network attacks.

    参考文献
    相似文献
    引证文献
引用本文

孙子文,张炎棋.工业信息物理系统的攻击建模研究[J].控制与决策,2019,34(11):2323-2329

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2019-10-30
  • 出版日期:
文章二维码