CN113486352B - Industrial control network-oriented quantitative evaluation method and system for influence of multi-mode attack mode on state of industrial control system - Google Patents

Industrial control network-oriented quantitative evaluation method and system for influence of multi-mode attack mode on state of industrial control system Download PDF

Info

Publication number
CN113486352B
CN113486352B CN202110698293.5A CN202110698293A CN113486352B CN 113486352 B CN113486352 B CN 113486352B CN 202110698293 A CN202110698293 A CN 202110698293A CN 113486352 B CN113486352 B CN 113486352B
Authority
CN
China
Prior art keywords
state
industrial control
control system
attack
type variable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110698293.5A
Other languages
Chinese (zh)
Other versions
CN113486352A (en
Inventor
徐丽娟
王英龙
杨美红
吴晓明
赵大伟
王浩玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Computer Science Center National Super Computing Center in Jinan
Original Assignee
Shandong Computer Science Center National Super Computing Center in Jinan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Computer Science Center National Super Computing Center in Jinan filed Critical Shandong Computer Science Center National Super Computing Center in Jinan
Priority to CN202110698293.5A priority Critical patent/CN113486352B/en
Publication of CN113486352A publication Critical patent/CN113486352A/en
Application granted granted Critical
Publication of CN113486352B publication Critical patent/CN113486352B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Abstract

The invention relates to a method and a system for quantitatively evaluating the influence of an industrial control system state by a multi-mode attack mode facing an industrial control network, which comprises the following steps: (1) performing primary description and extraction on state characteristics, namely an industrial control system state data set, and acquiring state data segmentation points; (2) clustering the state features; (3) constructing a state transition probability graph; (4) and quantitatively evaluating the influence of the system state based on the abnormal features and the damage degree indexes. The method is oriented to various industrial control network attack strategies, and the actual state changes of the system in the attack implementation stage and the attack termination stage are quantitatively evaluated by taking the state abnormity characteristics as main indexes, so that the problem that the influence of various attack strategies on the system state is difficult to accurately evaluate is solved. The invention provides an evaluation formula of the influence of the attack strategy on the system state, and evaluates and analyzes the state abnormal characteristics and the threat damage degree in a correlation manner to obtain an evaluation result which is more consistent with the influence of the actual state.

Description

Industrial control network-oriented quantitative evaluation method and system for influence of multi-mode attack mode on state of industrial control system
Technical Field
The invention relates to a method and a system for quantitatively evaluating the influence of an industrial control system state by a multi-mode attack mode facing an industrial control network, belonging to the technical field of information security.
Background
The possibility of attack exists in the engineer station, the Human Machine Interface (HMI), the control equipment, the sensor, the controlled equipment and other components in the industrial control network and the communication network between the components. The study work of students on the problem of influence of physical attack, man-in-the-middle attack, denial-of-service attack, hidden attack and the like on the industrial control network starts earlier. In 2009 Yu established a method to describe an attack threat model using attacks on command u and attacks on sensor parameters y, the way of denial of service attacks and man-in-the-middle attacks was performed, and the impact of different attack modes on each parameter was verified by analyzing the graph in a specific chemical reactor system. Krotofil's empirical analysis of the problem of challenges associated with the tennessee ismann process facing cyber-physical attacks investigates the impact on sensors in performing integrity attacks and denial of service attacks, proving that the resilience of process systems under cyber-physical attacks can be improved using process-known security analysis. Chen studied against data tampering attacks and analyzed the associated line graphs. The Liu combined with the network-power modeling and simulation test bed analyzed the effects of three different network events on the physical grid and displayed the results using a linear graph. Urbin quantifies the influence of hidden attacks, and provides a detection method for reducing the influence of the attacks. The above work mostly adopts observation methods to research the influence of attacks on the system state, and a quantitative evaluation method is lacked.
The work on the impact of semantic attacks on systems has only been of interest in recent years: li provides an attack influence ranking model aiming at the logic attack of the error sequence in the semantic attack, and evaluates the influence degree of the attack mode on the industrial control system by adopting three indexes of influence duration, distance from normal behavior, damage degree and the like, and the method ignores the relevance among the indexes; the method is characterized in that the Tian predicts the influence of the attack of a network physical system on the system by using a random mixed physical model based on the Bayesian network, describes an industrial control system by using a discrete time linear time invariant system, analyzes, reasons and calculates the change of variables in the system from a theoretical angle, and in actual production activities, the accuracy of the system state is influenced by the conditions of physical equipment abrasion, communication delay and the like; from the angle of the attacked node, Cui divides the attack into simultaneous attack, sequence attack and combined attack, provides a network-physical fault model, and researches the influence caused by the attacks from the theoretical angle.
The research of attack influence evaluation has important theoretical value and practical significance for identifying attack intentions, the research work of the scholars promotes the development of the equipment state influence analysis work under semantic attack, and the research under the specific safe attack and defense shooting range environment is relatively rare.
However, under the attack of the industrial control network, the equipment is in multiple stages of 'normal operation → attack progress → attack end', the state change characteristics in each stage are various, and the evaluation and analysis of the state characteristic change of each stage of the system under different attack strategies are lacked in the existing attack influence research work. In the existing semantic attack influence related research, the correlation evaluation and analysis between state abnormal characteristics and threat damage degree are lacked.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a quantitative evaluation method for the influence of an industrial control network-oriented multi-mode attack mode on the state of an industrial control system.
The invention also provides a system for quantitatively evaluating the influence of the multi-mode attack mode facing the industrial control network on the state of the industrial control system.
The invention realizes the description of the equipment state transition and the transition probability by constructing a state transition probability chart, and constructs a quantitative evaluation formula by taking the state abnormity type (state existence abnormity, state transition abnormity, state duration abnormity, state transition frequency abnormity and the like) as an index to realize the quantitative evaluation of the system state influence.
Interpretation of terms:
1. industrial control network: the industrial control network is a short name of industrial control network, is a network technology in the automatic control field developed in recent years, and is a product combining computer network, communication technology and automatic control technology. The industrial control network adapts to the development trend and the requirement of an enterprise information integration system and a management control integration system, is an extension of IT technology in the automatic control field, and is a local area network in the automatic control field. At present, industrial control networks comprise field buses, industrial Ethernet, industrial wireless networks and the like. The fieldbus refers to a data bus for digital, serial, and multipoint communication between field devices installed in a manufacturing or process area and automation devices in a control room, as defined by the international electrotechnical commission IEC61158 standard. Industrial ethernet is an ethernet technology applied to the field of industrial control, and is technically compatible with commercial ethernet (i.e., IEEE 802.3 standard), but the actual products and applications are completely different. The method is mainly characterized in that when a common commercial Ethernet product is designed, the requirements of an industrial field cannot be met in the aspects of material selection, product strength, applicability, instantaneity, interoperability, reliability, anti-interference performance, intrinsic safety and the like.
2. The industrial control system is a short name of an Industrial Control System (ICS). The industrial control system is a general name of various control systems including a supervisory control and data acquisition System (SCADA), a Distributed Control System (DCS) and the like, and is a brain and a central nerve of national key infrastructure of energy industries such as electric power, petroleum and petrochemical industry, nuclear energy and the like, traffic industries such as aviation, railway, highway and the like, urban public facility industries such as water treatment, subway and the like.
3. When the industrial control system is in normal operation, a state characteristic set is obtained and is called as a normal state characteristic set; when the industrial control system is attacked, a state characteristic set is obtained and is called as an attack state characteristic set, and if the state belongs to the attack state characteristic set but does not exist in the normal state characteristic set, the state is considered to be an abnormal state.
4. The delay is abnormal and the duration of the state is referred to as the delay of the state. When the industrial control system is in normal operation, a state characteristic set is obtained and is called as a normal state characteristic set; when the industrial control system is under attack, a state feature set is obtained and called as an attack state feature set, when the equipment state is an abnormal state, a state closest to the abnormal state is searched in a normal state feature set, and if the weight of the time delay of the abnormal state in the closest distance exceeds a threshold value, the state is considered as a time delay abnormal state.
5. Converting abnormity, and when the industrial control system is in normal operation, obtaining a state characteristic set, namely a normal state characteristic set; when the industrial control system is attacked, a state feature set is obtained and is called an attack state feature set. If a and b exist in both the normal state feature set and the attack state feature set, and if a and b are adjacent in the attack state feature set but other states exist between a and b in the normal state feature set, the state a is considered to be a transition exception when the state a is transitioned to the state b.
6. The frequency is abnormal, and when the industrial control system is in normal operation, a state characteristic set is obtained and is called as a normal state characteristic set; when the industrial control system is attacked, a state feature set is obtained and is called an attack state feature set. If the state a and the state b exist in both the normal state feature set and the attack state feature set, the transition from the state a to the state b is a normal transition, but the transition frequency of the state a to the state b calculated in the attack state feature set is smaller than or exceeds the transition frequency calculated in the normal state feature set, and the frequency anomaly is called.
7. Water distribution system raw state dataset: the water distribution system adopted by the invention simulates and constructs an SCADA (supervisory control and data acquisition) system of urban water affairs. The raw state data set of the system includes: data acquisition time, water level of the water tank 1, water level of the water tank 2, water level of the water tank 3, water pipe 1 switch (open 1; closed 0), water pipe 2 switch (open 1; closed 0), valve 1 switch (open 1; closed 0), valve 2 switch (open 1; closed 0), and the like.
The technical scheme of the invention is as follows:
a quantitative evaluation method for influence of an industrial control network-oriented multi-mode attack mode on the state of an industrial control system comprises the following steps:
(1) performing primary description and extraction on state characteristics, namely an industrial control system state data set, and acquiring state data segmentation points;
(2) clustering the state features;
(3) constructing a state transition probability graph;
(4) and quantitatively evaluating the influence of the system state based on the abnormal features and the damage degree indexes.
According to the invention, the specific implementation process of the step (1) comprises the following steps:
A. the method comprises the following steps of performing preliminary description on an industrial control system state data set, namely:
the industrial control system state data set is expressed as DS ═ CM, D, TDS },
Figure BDA0003128679870000031
Figure BDA0003128679870000032
TDS represents a time period, wherein TDSiIndicating a specific time, i ═ 1,2, … nt;ntIs the number of moments, and is also the length of the time period TDS;
Figure BDA0003128679870000033
CM denotes a set of continuous type variables in the industrial control system within the TDS period,
Figure BDA0003128679870000034
representing a continuous type variable, n, in an industrial control system during a TDS time periodcIs the number of continuous type variables; d represents a discrete type variable set in the industrial control system in the TDS time period,
Figure BDA0003128679870000035
representing a variable of discrete type, n, in an industrial control system within a TDS time perioddIs the number of discrete type variables;
therefore, the temperature of the molten metal is controlled,
Figure BDA0003128679870000041
Figure BDA0003128679870000042
Figure BDA0003128679870000043
respectively indicate correspondence in tdsjContinuous type variables and discrete type variables collected at any moment;
B. extracting the state data set of the industrial control system, namely:
data in CM were z-score normalized using formula (i):
Figure BDA0003128679870000044
in the formula (I), the compound is shown in the specification,
Figure BDA0003128679870000045
Figure BDA0003128679870000046
niis ciThe number of the elements in (A) and (B),
Figure BDA0003128679870000047
obtaining a new continuous state data set by formula (I)
Figure BDA0003128679870000048
C. Acquiring state data segmentation points, comprising:
a. traversing the discrete type variable set D, and when the discrete variables in the discrete type variable set D are changed, putting the serial numbers of the discrete variables which start to be changed into a discrete type variable division point list (disList);
b. traverse the new continuous state data set C', calculate Δ cci=c′i+1-c′i,Δcci+1=c′i+2-c′i+1If Δ cciNot less than 0 and Δ cci+1<0, or Δ cci<0 and Δ cci+1If the value is more than or equal to 0, putting i into a continuous type variable division point list consList;
c. merging the data in the disList and the consList to obtain the sPTs;
d. traversing the discist, for each element dPt, performing operations e through f as follows:
e. finding the element before dPt from the sPts, denoted pPt, and finding pPt corresponding continuous type variable index in the consList, denoted cIdx, in the new continuous variable data set
Figure BDA0003128679870000049
In (c), finding the continuous variable corresponding to cIdx, and recording the continuous variable as c'cIdxC 'is shown by formula (I)'cIdxIs a length ntC 'is judged according to the time sequence of (1)'cIdxIn (b), the obtained product is located at [ pPt, dPt ]]If the number of the variables in the interval is 1, pPt is deleted from the sPTs, otherwise, operation f is carried out;
f. finding the element index after dPt from the sPts, denoted as nIdx, and when nIdx is less than the total number of sPts, looping through the following operations f-1 to f-3; otherwise, exiting the loop;
f-1, finding the element value corresponding to the nIdx in the sPTs, and marking as nPt;
f-2, finding nPt corresponding continuous variable index in the consList, and recording as cIdx;
f-3, judging a continuous type variable c'cIdxIn (b), the obtained product is located at [ dPt, nPt ]]If the number of the variables in the interval is 1 or 2, nPt is deleted from the sPTs, otherwise, the loop is exited;
D. the characteristic extraction means that:
g. traversing each element Pt in sPTsiAnd element Pt behind iti+1Calculating Δ PT per time slicei=Pti+1-PtiThe number of the time slices is set as mt(ii) a Will be delta PTiIs marked as
Figure BDA00031286798700000410
i=1,2,…,mtThen form a new time slice set
Figure BDA00031286798700000411
h、Traverse each time slice
Figure BDA0003128679870000051
Set of all discrete variables after time slicing
Figure BDA0003128679870000052
Wherein the content of the first and second substances,
Figure BDA0003128679870000053
Figure BDA0003128679870000054
is in time slices
Figure BDA0003128679870000055
The discrete type variable set collected in the system and all continuous type variable sets after time slice division are recorded as
Figure BDA0003128679870000056
Figure BDA0003128679870000057
Figure BDA0003128679870000058
Is shown in time slice
Figure BDA0003128679870000059
The continuous type variable set collected in the system;
as can be seen from the time slice division process of steps A-C, in time slices
Figure BDA00031286798700000510
The discrete type variables in are identical
Figure BDA00031286798700000511
Representing time slices
Figure BDA00031286798700000512
Any one set of discrete variables in
Figure BDA00031286798700000513
Of a particular element, and therefore, use
Figure BDA00031286798700000514
To represent
Figure BDA00031286798700000515
At this time, the process of the present invention,
Figure BDA00031286798700000516
Figure BDA00031286798700000517
i. for each time slice
Figure BDA00031286798700000518
Computing
Figure BDA00031286798700000519
Where j is ∈ [1, n ]c],i∈[1,mt];
Figure BDA00031286798700000520
Is in time slices
Figure BDA00031286798700000521
The maximum value in the set of continuous type variables acquired,
Figure BDA00031286798700000522
is in time slices
Figure BDA00031286798700000523
Minimum value in the continuous type variable set collected;
Figure BDA00031286798700000524
representing sets of continuous variables
Figure BDA00031286798700000525
In time slice
Figure BDA00031286798700000526
The slope of (d);
j. obtaining a device state feature description set which is finally expressed as
Figure BDA00031286798700000527
Wherein
Figure BDA00031286798700000528
The device state feature set is the final set obtained through the steps a-j
Figure BDA00031286798700000529
The state data is equipment state data directly acquired from an industrial control system, is input data of the step A, and is a data source for acquiring state characteristic data.
Further preferably, the specific implementation process of step a includes:
a-1, setting i to 1;
a-2. judging that i ═ ndWhether the information is established or not, if so, exiting; otherwise, performing step a-3;
a-3. judgment of di=di+1If the result is true, if the result is false, putting i +1 into a discrete type variable division point list (disList), and performing the step a-4; if yes, directly performing the step a-4;
and a-4, adding 1 to i, and executing the step a-2.
Preferably, in the step (2), the clustering of the state features includes:
k. initializing elements in a device state profile set
Figure BDA00031286798700000530
Wherein j is equal to [1, m ]t]The corresponding cluster number set Clrs is null, and the radius expansion threshold rTred belongs to [0.02,0.1 ]]The radius extension range rRange ∈ [ 2 ]1.05,1.35];
l, from
Figure BDA00031286798700000531
Selecting the point with the maximum distance from all the points as a first central point, and putting the first central point into a central point set Cts;
m, calculating
Figure BDA0003128679870000061
The minimum distance between other elements in the set and each element in the central point is formed into a set dList;
n, selecting an element iCtr corresponding to the maximum distance in the dList, and adding the iCtr into the Cts;
o, setting the updated flag to be true;
and p, when the flag is true, repeating the following steps from p-1 to p-5, otherwise, exiting:
p-1, assigning flag to false;
p-2. traversal
Figure BDA0003128679870000062
Each element in (1)
Figure BDA00031286798700000615
Figure BDA0003128679870000063
i=1,..,mtFrom Cts, find and
Figure BDA0003128679870000064
recording the index of the element with the minimum distance as c, and recording the minimum distance minDist and c;
p-3. if Clrs [ i ] is not equal to c, Clrs [ i ] is equal to c, flag is assigned to true, and step p-4 is performed; otherwise, directly executing the step p-4;
p-4. update center points in Cts to
Figure BDA0003128679870000065
The mean of all elements belonging to the cluster;
p-5. performing p-5-1 to p-5-2 for each element Cts [ j ] in Cts:
p-5-1.Rs[j]is composed of
Figure BDA0003128679870000066
All elements in (1) belonging to cluster j and center point Cts [ j]Maximum value of (d);
p-5-2. if Rs [ j ] ═ 0, then Rs [ j ] ═ 0+ rThrd is calculated, otherwise Rs [ j ] ═ 0 × rRange;
using the above clustering method, pair
Figure BDA0003128679870000067
After clustering, forming a new state feature set by taking various central points as states
Figure BDA0003128679870000068
msIs the number of clusters.
More preferably, the radius expansion threshold rtord is 0.06 and the radius expansion range rRange is 1.2.
It is further preferred that the first and second liquid crystal compositions,
Figure BDA0003128679870000069
at any two points
Figure BDA00031286798700000610
The distance between
Figure BDA00031286798700000611
The formula (II) is shown as the following formula:
Figure BDA00031286798700000612
according to the invention, the specific implementation process of the step (3) is as follows:
the state transition probability map is represented as G ═ { V, p (tr) }1,v2,…,vnThe vertex set in the state transition probability graph, namely the new state feature set S generated in the step (2), is represented; TR ═ { TRi→j,i,j∈[1,n]},TRi→jRepresenting slave state viTo state vjThe transfer relationship of (1); wherein: p (TR) { P (TR)i→j),i,j∈V},
Figure BDA00031286798700000613
Representing slave state viTo state vjIn which num (TR)i→j) Is TRi→jNumber of state transitions, num (tr) Σi,j∈Vnum(TRi→j) The sum of all state transition times;
the state stored in the new state feature set S generated in the step (2)
Figure BDA00031286798700000614
Is a vertex V in the state transition probability map, according to
Figure BDA0003128679870000071
Generates a transition probability set p (tr) based on the transition relationships between the states.
Preferably, in step (4), the attack impact quantitative evaluation method based on the abnormal feature and damage degree index fusion analysis quantitatively evaluates the system state impact, and the specific implementation process is as follows:
in the attack influence quantitative evaluation method based on the abnormal feature and damage degree index fusion analysis, aiming at different continuous category variables such as temperature, humidity, height and the like, the weights corresponding to the damage degrees of the industrial control system states are recorded as Weit,
Figure BDA0003128679870000072
satisfies the following conditions:
Figure BDA0003128679870000073
quantitative evaluation of state anomalies, time delay anomalies, conversion anomalies, frequency anomalies was performed using the following formulas:
when the system is in normal operation, a state data set DS is obtainednor={CMnor,Dnor,TDSnorAnd (c), each item corresponds to the normal state industrial control system state data set DS ═ CM, D, TDS one to one, and the steps a to p are executed to obtain a state feature set
Figure BDA0003128679870000074
msnorIs the number of normal clusters, each term of which is associated with
Figure BDA0003128679870000075
One to one correspondence according to SnorObtained state probability graph Gnor={Vnor,Pnor(TRnor) Each item of the state probability map is in one-to-one correspondence with a state probability map G { V, P (TR) } obtained when the system operates normally;
when the system is under attack, the state data set DS is acquiredatt={CMatt,Datt,TDSattAnd (c), each item corresponds to the normal state industrial control system state data set DS ═ CM, D, TDS one to one, and the steps a to p are executed to obtain a state feature set
Figure BDA0003128679870000076
msattIs the number of clusters, each term of which is associated with
Figure BDA0003128679870000077
One to one correspondence according to SattObtained state probability graph Gatt={Vatt,Patt(TRatt) Each item of the state probability map is in one-to-one correspondence with a state probability map G { V, P (TR) } obtained when the system operates normally;
setting:
Figure BDA0003128679870000078
wherein the content of the first and second substances,
Figure BDA0003128679870000079
is a continuous type variable characteristic of the variable,
Figure BDA00031286798700000710
the characteristics of the variables of the discrete type are represented,
Figure BDA00031286798700000711
representing the time slice after the division;
Figure BDA00031286798700000712
is represented by the formulaattMiddle state
Figure BDA00031286798700000713
The closest state is obtained by the following equation (III):
Figure BDA00031286798700000714
in the formula (III), the compound represented by the formula (III),
Figure BDA00031286798700000715
Figure BDA00031286798700000716
does not exist in the set SnorIn a direction of
Figure BDA00031286798700000717
Variable characteristics of medium discrete type and
Figure BDA00031286798700000718
the discrete type variables are characterized identically.
The stateless quantitative evaluation formula is shown as formula (IV):
Figure BDA00031286798700000719
in the formula (IV), EVALNoIndicating a stateless quantitative evaluation value for the evaluation,
Figure BDA0003128679870000081
to represent
Figure BDA0003128679870000082
And
Figure BDA0003128679870000083
the maximum value of the middle time slice,
Figure BDA0003128679870000084
to represent
Figure BDA0003128679870000085
And
Figure BDA0003128679870000086
the smallest of the medium time slices,
Figure BDA0003128679870000087
to represent
Figure BDA0003128679870000088
And
Figure BDA0003128679870000089
the corresponding index in (a) is the maximum value of the continuous type variable of j,
Figure BDA00031286798700000810
to represent
Figure BDA00031286798700000811
And
Figure BDA00031286798700000812
the corresponding index in (1) is the minimum value of the continuous type variable of j;
is provided with
Figure BDA00031286798700000813
Figure BDA00031286798700000814
Wherein d iswit(. is a time delay characteristic weight calculation formula, τdrtRepresenting the threshold value set by the state proportion of the time delay feature, S'drtIs a set of state delay anomaliesThe body is defined as follows:
Figure BDA00031286798700000815
Figure BDA00031286798700000816
in the formula (V), ndIs the number of discrete type variables, siDenotes SattIn a certain state, sjDenotes SnorIn a certain state, eduDist(s)i,sj) Denotes si,sjThe distance between the two or more of the two or more,
Figure BDA00031286798700000817
is siThe corresponding kth discrete-type variable value,
Figure BDA00031286798700000818
is sjThe corresponding kth discrete-type variable value,
Figure BDA00031286798700000819
is siThe corresponding value of the i-th consecutive type variable in (a),
Figure BDA00031286798700000820
is sjThe corresponding value of the i-th consecutive type variable in (a),
Figure BDA00031286798700000821
is siThe time slice in the middle time slice is,
Figure BDA00031286798700000822
is sjA middle time slice;
Figure BDA00031286798700000823
representing a state transition exception set, and meeting the following conditions:
Figure BDA00031286798700000824
denotes SnorIn a certain state, state transition relation
Figure BDA00031286798700000825
Present in TRattIn (1), however,
Figure BDA00031286798700000826
not present in TRnorPerforming the following steps;
according to the state
Figure BDA00031286798700000827
Recent state
Figure BDA00031286798700000828
Finding a normal state feature set SnorNeutralization of
Figure BDA00031286798700000829
The nearest state features are respectively recorded as
Figure BDA00031286798700000830
The quantitative evaluation formulas of the time delay abnormity and the conversion abnormity are respectively shown as formulas (VI) and (VII):
Figure BDA00031286798700000831
Figure BDA00031286798700000832
in formulae (VI) and (VII), EVALDrtRepresents the quantitative evaluation value of the time delay abnormity,
Figure BDA0003128679870000091
to represent
Figure BDA0003128679870000092
The time slice in (1) is set,
Figure BDA0003128679870000093
to represent
Figure BDA0003128679870000094
The middle index is a continuous type variable value of j,
Figure BDA0003128679870000095
to represent
Figure BDA0003128679870000096
The middle index is the continuous type variable value of j.
EVALTransAn abnormal quantitative evaluation value indicating a state transition relation,
Figure BDA0003128679870000097
to represent
Figure BDA0003128679870000098
The time slice in (1) is set,
Figure BDA0003128679870000099
to represent
Figure BDA00031286798700000910
The time slice in (1) is set,
Figure BDA00031286798700000911
to represent
Figure BDA00031286798700000912
The middle index is a continuous type variable value of j,
Figure BDA00031286798700000913
to represent
Figure BDA00031286798700000914
The middle index is a continuous type variable value of j;
is provided with
Figure BDA00031286798700000915
Is a status feature
Figure BDA00031286798700000916
To the direction of
Figure BDA00031286798700000917
The abnormal frequency of the transition is such that,
Figure BDA00031286798700000918
and
Figure BDA00031286798700000919
is already present in SnorIs also present in SattIs in a certain state of (a) or (b),
Figure BDA00031286798700000920
if the frequency is a normal conversion frequency corresponding to the state conversion, the conversion frequency abnormality quantitative evaluation formula is defined as formula (VIII):
Figure BDA00031286798700000921
in the formula (VIII), EVALFreqIt represents a quantitative evaluation value of the abnormal frequency,
Figure BDA00031286798700000922
to represent
Figure BDA00031286798700000923
The time slice in (1) is set,
Figure BDA00031286798700000924
to represent
Figure BDA00031286798700000925
The time slice of (1);
the final quantitative evaluation formula of the influence of the attack on the state of the industrial control system is shown as the formula (IX):
VANC=EVALNo+EVALDrt+EVALTrans+EVALFreq(Ⅸ)
finally obtaining VANC through the formula (IX), wherein the VANC is the sum of quantitative evaluation of four abnormal conditions including no state, time delay abnormality, conversion abnormality and conversion probability abnormality.
A multi-mode attack mode based on an industrial control network has a quantitative evaluation system for the influence of the state of an industrial control system, which comprises a state data primary description and extraction unit, a clustering unit, a state transition probability graph construction unit and a quantitative evaluation unit;
the state data preliminary description and extraction unit is used for executing the step (1); the clustering unit is used for executing the step (2); the state transition probability map construction unit is used for executing the step (3); the quantitative evaluation unit is used for executing the step (4).
The invention has the beneficial effects that:
1. the method is oriented to various industrial control network attack strategies, and the actual state changes of the system in the attack implementation stage and the attack termination stage are quantitatively evaluated by taking the state abnormity characteristics as main indexes, so that the problem that the influence of various attack strategies on the system state is difficult to accurately evaluate is solved.
2. The invention provides an evaluation formula of the influence of the attack strategy on the system state, and evaluates and analyzes the state abnormal characteristics and the threat damage degree in a correlation manner to obtain an evaluation result which is more consistent with the influence of the actual state.
3. The invention is used for detecting the abnormity of information security events and various industrial control networks.
Drawings
FIG. 1 is a schematic flow chart of the present invention for generating a state transition probability map from raw state data sets:
FIG. 2 is a flow chart of the quantitative evaluation method of the influence of the multi-mode attack mode facing the industrial control network on the state of the industrial control system according to the invention;
fig. 3 is a schematic diagram illustrating a comparison between the states of the continuous variables T1, T2, and T3 collected in the corresponding industrial control system in the data set 1 during normal operation and under attack in the embodiment;
fig. 4 is a schematic diagram illustrating a comparison between the states of the continuous variables T1, T2, and T3 collected in the corresponding industrial control system in the data set 2 during normal operation and under attack in the embodiment;
fig. 5 is a schematic diagram illustrating a comparison between the states of the continuous variables T1, T2, and T3 collected in the corresponding industrial control system in the data set 3 during normal operation and under attack in the embodiment;
fig. 6 is a schematic diagram illustrating a comparison between the states of the continuous variables T1, T2, and T3 collected in the corresponding industrial control system in the data set 4 in normal operation and in attack in the embodiment;
fig. 7 is a schematic diagram illustrating a comparison between the states of the continuous variables T1, T2, and T3 collected in the corresponding industrial control system in the data set 5 in normal operation and in attack in the embodiment;
FIG. 8 is a schematic structural diagram of a quantitative evaluation system for the influence of the multi-mode attack mode of the industrial control network on the state of the industrial control system according to the present invention;
FIG. 9 is a flow chart illustrating the quantitative evaluation of the influence of the system status according to the present invention.
Detailed Description
The invention is further defined in the following, but not limited to, the figures and examples in the description.
Example 1
A quantitative evaluation method for influence of an industrial control network-oriented multi-mode attack mode on the state of an industrial control system comprises the following steps:
(1) performing primary description and extraction on state characteristics, namely an industrial control system state data set, and acquiring state data segmentation points;
(2) clustering the state features;
(3) constructing a state transition probability graph;
(4) and quantitatively evaluating the influence of the system state based on the abnormal features and the damage degree indexes.
The flow of generating a state transition probability map from a raw state data set is shown in fig. 1.
The flow of the quantitative evaluation method for the influence of the multi-mode attack mode facing the industrial control network on the state of the industrial control system is shown in fig. 2, and comprises the following steps:
firstly, when the industrial control system normally operates, the industrial control system starts to collect state original data, and after the system operates for 720 hours, the state data collection is finished, wherein the collected data set is called a normal state data set.
Next, five attack data sets are collected according to the following attack data set collection description procedures, respectively. And according to attack starting time and attack ending time, 5 attack data sets are divided into corresponding attack progress phase data sets and attack ending phase data sets respectively.
Then, inputting the normal state data set into the state transition probability map generation flow, generating a normal state transition probability map, inputting the attack progress stage data set and the attack end stage data set corresponding to each attack data set into the state transition probability map generation flow, and generating 5 groups of attack progress stage state transition probability maps and attack end stage state transition probability maps.
And finally, taking the normal state transition probability graph and each group of attack progress stage state transition probability graphs and the attack end stage state transition probability graph as input, and calculating attack progress stage state influence values and attack end stage state influence values by using a state influence quantitative evaluation formula.
Example 2
The method for quantitatively evaluating the influence of the multi-mode attack mode facing the industrial control network on the state of the industrial control system, which is described in the embodiment 1, is characterized in that:
the specific implementation process of the step (1) comprises the following steps:
A. the method comprises the following steps of performing preliminary description on an industrial control system state data set, namely:
the industrial control system state data set is expressed as DS ═ CM, D, TDS },
Figure BDA0003128679870000111
Figure BDA0003128679870000112
TDS represents a time period, wherein TDSiIndicating a specific time, i ═ 1,2, … nt;ntIs the number of moments, and is also the length of the time period TDS;
Figure BDA0003128679870000113
CM denotes a set of continuous type variables in the industrial control system within the TDS period,
Figure BDA0003128679870000114
representing a continuous type variable, n, in an industrial control system during a TDS time periodcIs the number of continuous type variables; d represents a discrete type variable set in the industrial control system in the TDS time period,
Figure BDA0003128679870000115
representing a variable of discrete type, n, in an industrial control system within a TDS time perioddIs the number of discrete type variables;
therefore, the temperature of the molten metal is controlled,
Figure BDA0003128679870000116
Figure BDA0003128679870000117
Figure BDA0003128679870000118
respectively indicate correspondence in tdsjContinuous type variables and discrete type variables collected at any moment;
B. extracting the state data set of the industrial control system, namely:
data in CM were z-score normalized using formula (i):
Figure BDA0003128679870000119
in the formula (I), the compound is shown in the specification,
Figure BDA00031286798700001110
Figure BDA00031286798700001111
niis ciThe number of the elements in (A) and (B),
Figure BDA00031286798700001112
obtaining a new continuous state data set by formula (I)
Figure BDA00031286798700001113
C. Acquiring state data segmentation points, comprising:
a. traversing the discrete type variable set D, and when the discrete variables in the discrete type variable set D are changed, putting the serial numbers of the discrete variables which start to be changed into a discrete type variable division point list (disList);
b. traverse the new continuous state data set C', calculate Δ cci=c′i+1-c′i,Δcci+1=c′i+2-c′i+1If Δ cciNot less than 0 and Δ cci+1<0, or Δ cci<0 and Δ cci+1If the value is more than or equal to 0, putting i into a continuous type variable division point list consList;
c. merging the data in the disList and the consList to obtain the sPTs;
d. traversing the discist, for each element dPt, performing operations e through f as follows:
e. finding the element before dPt from the sPts, denoted pPt, and finding pPt corresponding continuous type variable index in the consList, denoted cIdx, in the new continuous variable data set
Figure BDA0003128679870000121
In (c), finding the continuous variable corresponding to cIdx, and recording the continuous variable as c'cIdxC 'is shown by formula (I)'cIdxIs a length ntC 'is judged according to the time sequence of (1)'cIdxIn (b), the obtained product is located at [ pPt, dPt ]]If the number of the variables in the interval is 1, pPt is deleted from the sPTs, otherwise, operation f is carried out;
f. finding the element index after dPt from the sPts, denoted as nIdx, and when nIdx is less than the total number of sPts, looping through the following operations f-1 to f-3; otherwise, exiting the loop;
f-1, finding the element value corresponding to the nIdx in the sPTs, and marking as nPt;
f-2, finding nPt corresponding continuous variable index in the consList, and recording as cIdx;
f-3, judging a continuous type variable c'cIdxIn (b), the obtained product is located at [ dPt, nPt ]]If the number of the variables in the interval is 1 or 2, nPt is deleted from the sPTs, otherwise, the loop is exited;
D. the characteristic extraction means that:
g. traversing each element Pt in sPTsiAnd element Pt behind iti+1Calculating Δ PT per time slicei=Pti+1-PtiThe number of the time slices is set as mt(ii) a Will be delta PTiIs marked as
Figure BDA0003128679870000122
i=1,2,…,mtThen form a new time slice set
Figure BDA0003128679870000123
h. Traverse each time slice
Figure BDA0003128679870000124
Set of all discrete variables after time slicing
Figure BDA0003128679870000125
Wherein the content of the first and second substances,
Figure BDA0003128679870000126
Figure BDA0003128679870000127
is in time slices
Figure BDA00031286798700001220
The discrete type variable set collected in the system and all continuous type variable sets after time slice division are recorded as
Figure BDA0003128679870000128
Figure BDA0003128679870000129
Figure BDA00031286798700001210
Is shown in time slice
Figure BDA00031286798700001211
The continuous type variable set collected in the system;
as can be seen from the time slice division process of steps A-C, in time slices
Figure BDA00031286798700001212
The discrete type variables in are identical
Figure BDA00031286798700001213
Representing time slices
Figure BDA00031286798700001214
Any one set of discrete variables in
Figure BDA00031286798700001215
Of a particular element, and therefore, use
Figure BDA00031286798700001216
To represent
Figure BDA00031286798700001217
At this time, the process of the present invention,
Figure BDA00031286798700001218
Figure BDA00031286798700001219
i. for each time slice
Figure BDA0003128679870000131
Computing
Figure BDA0003128679870000132
Where j is ∈ [1, n ]c],i∈[1,mt];
Figure BDA0003128679870000133
Is in time slices
Figure BDA0003128679870000134
The maximum value in the set of continuous type variables acquired,
Figure BDA0003128679870000135
is in time slices
Figure BDA0003128679870000136
Minimum value in the continuous type variable set collected;
Figure BDA0003128679870000137
representing sets of continuous variables
Figure BDA0003128679870000138
In time slice
Figure BDA0003128679870000139
The slope of (d);
j. obtaining a device state feature description set which is finally expressed as
Figure BDA00031286798700001310
Wherein
Figure BDA00031286798700001311
The device state feature set is the final set obtained through the steps a-j
Figure BDA00031286798700001312
The state data is equipment state data directly acquired from an industrial control system, is input data of the step A, and is a data source for acquiring state characteristic data.
The specific implementation process of the step a comprises the following steps:
a-1, setting i to 1;
a-2. judging that i ═ ndWhether the information is established or not, if so, exiting; otherwise, performing step a-3;
a-3. judgment of di=di+1If the result is true, if the result is false, putting i +1 into a discrete type variable division point list (disList), and performing the step a-4; if yes, directly performing the step a-4;
and a-4, adding 1 to i, and executing the step a-2.
In the step (2), clustering is carried out on the state characteristics, and the specific steps comprise:
k. initializing elements in a device state profile set
Figure BDA00031286798700001313
Wherein j is equal to [1, m ]t]The corresponding cluster number set Clrs is empty, the radius expansion threshold rtord is 0.06, and the radius expansion range rRange is 1.2;
l, from
Figure BDA00031286798700001314
Selecting the point with the maximum distance from all the points as a first central point, and putting the first central point into a central point set Cts;
m, calculating
Figure BDA00031286798700001315
The minimum distance between other elements in the set and each element in the central point is formed into a set dList;
n, selecting an element iCtr corresponding to the maximum distance in the dList, and adding the iCtr into the Cts;
o, setting the updated flag to be true;
and p, when the flag is true, repeating the following steps from p-1 to p-5, otherwise, exiting:
p-1, assigning flag to false;
p-2. traversal
Figure BDA00031286798700001316
Each element in (1)
Figure BDA00031286798700001317
Figure BDA00031286798700001318
i=1,..,mtFrom Cts, find and
Figure BDA00031286798700001319
recording the index of the element with the minimum distance as c, and recording the minimum distance minDist and c;
p-3. if Clrs [ i ] is not equal to c, Clrs [ i ] is equal to c, flag is assigned to true, and step p-4 is performed; otherwise, directly executing the step p-4;
p-4. update center points in Cts to
Figure BDA0003128679870000141
The mean of all elements belonging to the cluster;
p-5. performing p-5-1 to p-5-2 for each element Cts [ j ] in Cts:
p-5-1.Rs[j]is composed of
Figure BDA0003128679870000142
All elements in (1) belonging to cluster j and center point Cts [ j]Maximum value of (d);
p-5-2. if Rs [ j ] ═ 0, then Rs [ j ] ═ 0+ rThrd is calculated, otherwise Rs [ j ] ═ 0 × rRange;
using the above clustering method, pair
Figure BDA0003128679870000143
After clustering, forming a new state feature set by taking various central points as states
Figure BDA0003128679870000144
msIs the number of clusters.
Figure BDA0003128679870000145
At any two points
Figure BDA0003128679870000146
The distance between
Figure BDA0003128679870000147
The formula (II) is shown as the following formula:
Figure BDA0003128679870000148
the specific implementation process of the step (3) is as follows:
the state transition probability map is represented as G ═ { V, p (tr) }1,v2,…,vnThe vertex set in the state transition probability graph, namely the new state feature set S generated in the step (2), is represented; TR ═ { TRi→j,i,j∈[1,n]},TRi→jRepresenting slave state viTo state vjThe transfer relationship of (1); wherein: p (TR) { P (TR)i→j),i,j∈V},
Figure BDA0003128679870000149
Representing slave state viTo state vjIn which num (TR)i→j) Is TRi→jNumber of state transitions, num (tr) Σi,j∈Vnum(TRi→j) The sum of all state transition times;
the state stored in the new state feature set S generated in the step (2)
Figure BDA00031286798700001410
Is a vertex V in the state transition probability map, according to
Figure BDA00031286798700001411
Generates a transition probability set p (tr) based on the transition relationships between the states.
For example, after performing steps a-j, a set is obtained
Figure BDA00031286798700001412
Wherein the content of the first and second substances,
Figure BDA00031286798700001413
mtis the number of time slices.
Figure BDA00031286798700001414
Representing time slices
Figure BDA00031286798700001415
Internally computed continuous type variable features, discrete type variable features, and time slices
Figure BDA00031286798700001416
A set of compositions. Performing the step k to p pairs
Figure BDA00031286798700001417
After clustering, forming a new state feature set by taking various central points as states
Figure BDA00031286798700001418
msIs the number of clusters and is also the number of new state sets. Wherein s isr∈S,r∈[1,ms],ms<mt. According to the clustering principle, for arbitrary
Figure BDA00031286798700001419
Can find an srCorresponding to it.
For any two adjacent features
Figure BDA00031286798700001420
And
Figure BDA00031286798700001421
Figure BDA00031286798700001422
the corresponding cluster center point is
Figure BDA00031286798700001423
Figure BDA00031286798700001424
The corresponding cluster center point is
Figure BDA00031286798700001425
Then a state transition between two adjacent state sets is considered to exist, then
Figure BDA00031286798700001426
And
Figure BDA00031286798700001427
there is a state transition between, then, if
Figure BDA00031286798700001428
And
Figure BDA00031286798700001429
is not equal, then can get
Figure BDA0003128679870000151
Figure BDA0003128679870000152
Self-growth 1; otherwise, no processing is performed. According to the above principle, traverse
Figure BDA0003128679870000153
All adjacent features obtain their corresponding features in S, update the state transition set TR and its corresponding state transition times, and finally use the state transition probability calculation formula:
Figure BDA0003128679870000154
all transition probabilities are calculated, and all state transition probabilities constitute a set of transition probabilities p (tr).
In the step (4), the attack influence quantitative evaluation method based on the abnormal characteristic and damage degree index fusion analysis carries out quantitative evaluation on the influence of the system state, and the specific implementation process is as follows:
in the attack influence quantitative evaluation method based on the abnormal feature and damage degree index fusion analysis, aiming at different continuous category variables such as temperature, humidity, height and the like, the weights corresponding to the damage degrees of the industrial control system states are recorded as Weit,
Figure BDA0003128679870000155
satisfies the following conditions:
Figure BDA0003128679870000156
quantitative evaluation of state anomalies, time delay anomalies, conversion anomalies, frequency anomalies was performed using the following formulas:
when the system is in normal operation, a state data set DS is obtainednor={CMnor,Dnor,TDSnorAnd (c), each item corresponds to the normal state industrial control system state data set DS ═ CM, D, TDS one to one, and the steps a to p are executed to obtain a state feature set
Figure BDA0003128679870000157
msnorIs the number of normal clusters, each term of which is associated with
Figure BDA0003128679870000158
One to one correspondence according to SnorObtained state probability graph Gnor={Vnor,Pnor(TRnor) Each item of the state probability map is in one-to-one correspondence with a state probability map G { V, P (TR) } obtained when the system operates normally;
when the system is under attack, the state data set DS is acquiredatt={CMatt,Datt,TDSattAnd (c), each item corresponds to the normal state industrial control system state data set DS ═ CM, D, TDS one to one, and the steps a to p are executed to obtain a state feature set
Figure BDA0003128679870000159
msattIs the number of clusters, each term of which is associated with
Figure BDA00031286798700001510
One to one correspondence according to SattObtained state probability graph Gatt={Vatt,Patt(TRatt) Each item of the state probability map is in one-to-one correspondence with a state probability map G { V, P (TR) } obtained when the system operates normally;
setting:
Figure BDA00031286798700001511
wherein the content of the first and second substances,
Figure BDA00031286798700001512
is a continuous type variable characteristic of the variable,
Figure BDA00031286798700001513
the characteristics of the variables of the discrete type are represented,
Figure BDA00031286798700001514
representing the time slice after the division;
Figure BDA00031286798700001515
is represented by the formulaattMiddle state
Figure BDA00031286798700001516
The closest state is obtained by the following equation (III):
Figure BDA00031286798700001517
in the formula (III), the compound represented by the formula (III),
Figure BDA00031286798700001518
Figure BDA00031286798700001519
does not exist in the set SnorIn a direction of
Figure BDA0003128679870000161
Variable of medium discrete typeFeatures and
Figure BDA0003128679870000162
the discrete type variables are characterized identically.
The stateless quantitative evaluation formula is shown as formula (IV):
Figure BDA0003128679870000163
in the formula (IV), EVALNoIndicating a stateless quantitative evaluation value for the evaluation,
Figure BDA0003128679870000164
to represent
Figure BDA0003128679870000165
And
Figure BDA0003128679870000166
the maximum value of the middle time slice,
Figure BDA0003128679870000167
to represent
Figure BDA0003128679870000168
And
Figure BDA0003128679870000169
the smallest of the medium time slices,
Figure BDA00031286798700001610
to represent
Figure BDA00031286798700001611
And
Figure BDA00031286798700001612
the corresponding index in (a) is the maximum value of the continuous type variable of j,
Figure BDA00031286798700001613
to represent
Figure BDA00031286798700001614
And
Figure BDA00031286798700001615
the corresponding index in (1) is the minimum value of the continuous type variable of j;
is provided with
Figure BDA00031286798700001616
Figure BDA00031286798700001617
Wherein d iswit(. is a time delay characteristic weight calculation formula, τdrtRepresenting the threshold value set by the state proportion of the time delay feature, S'drtThe state delay anomaly set is specifically defined as follows:
Figure BDA00031286798700001618
Figure BDA00031286798700001619
in the formula (V), ndIs the number of discrete type variables, siDenotes SattIn a certain state, sjDenotes SnorIn a certain state, eduDist(s)i,sj) Denotes si,sjThe distance between the two or more of the two or more,
Figure BDA00031286798700001620
is siThe corresponding kth discrete-type variable value,
Figure BDA00031286798700001621
is sjThe corresponding kth discrete-type variable value,
Figure BDA00031286798700001622
is siThe corresponding value of the i-th consecutive type variable in (a),
Figure BDA00031286798700001623
is sjThe corresponding value of the i-th consecutive type variable in (a),
Figure BDA00031286798700001624
is siThe time slice in the middle time slice is,
Figure BDA00031286798700001625
is sjA middle time slice;
Figure BDA00031286798700001626
representing a state transition exception set, and meeting the following conditions:
Figure BDA00031286798700001627
denotes SnorIn a certain state, state transition relation
Figure BDA00031286798700001628
Present in TRattIn (1), however,
Figure BDA00031286798700001629
not present in TRnorPerforming the following steps;
according to the state
Figure BDA00031286798700001630
Recent state
Figure BDA00031286798700001631
Finding a normal state feature set SnorNeutralization of
Figure BDA00031286798700001632
The nearest state features are respectively recorded as
Figure BDA00031286798700001633
The quantitative evaluation formulas of the time delay abnormity and the conversion abnormity are respectively shown as formulas (VI) and (VII):
Figure BDA0003128679870000171
Figure BDA0003128679870000172
in formulae (VI) and (VII), EVALDrtRepresents the quantitative evaluation value of the time delay abnormity,
Figure BDA0003128679870000173
to represent
Figure BDA0003128679870000174
The time slice in (1) is set,
Figure BDA0003128679870000175
to represent
Figure BDA0003128679870000176
The middle index is a continuous type variable value of j,
Figure BDA0003128679870000177
to represent
Figure BDA0003128679870000178
The middle index is the continuous type variable value of j.
EVALTransAn abnormal quantitative evaluation value indicating a state transition relation,
Figure BDA0003128679870000179
to represent
Figure BDA00031286798700001710
The time slice in (1) is set,
Figure BDA00031286798700001711
to represent
Figure BDA00031286798700001712
The time slice in (1) is set,
Figure BDA00031286798700001713
to represent
Figure BDA00031286798700001714
The middle index is a continuous type variable value of j,
Figure BDA00031286798700001715
to represent
Figure BDA00031286798700001716
The middle index is a continuous type variable value of j;
is provided with
Figure BDA00031286798700001717
Is a status feature
Figure BDA00031286798700001718
To the direction of
Figure BDA00031286798700001719
The abnormal frequency of the transition is such that,
Figure BDA00031286798700001720
and
Figure BDA00031286798700001721
is already present in SnorIs also present in SattIs in a certain state of (a) or (b),
Figure BDA00031286798700001722
if the frequency is a normal conversion frequency corresponding to the state conversion, the conversion frequency abnormality quantitative evaluation formula is defined as formula (VIII):
Figure BDA00031286798700001723
in the formula (VIII), EVALFreqIt represents a quantitative evaluation value of the abnormal frequency,
Figure BDA00031286798700001724
to represent
Figure BDA00031286798700001725
The time slice in (1) is set,
Figure BDA00031286798700001726
to represent
Figure BDA00031286798700001727
The time slice of (1);
the final quantitative evaluation formula of the influence of the attack on the state of the industrial control system is shown as the formula (IX):
VANC=EVALNo+EVALDrt+EVALTrans+EVALFreq(Ⅸ)
finally obtaining VANC through the formula (IX), wherein the VANC is the sum of quantitative evaluation of four abnormal conditions including no state, time delay abnormality, conversion abnormality and conversion probability abnormality.
The flow of quantitative assessment of the impact of system conditions is shown in figure 9. The method comprises the following steps:
traversing each vertex in the state transition probability graph of the attack stage, judging whether the vertex exists in a vertex set of the normal state transition probability graph or not, if not, adopting a formula (III) to calculate a vertex which is closest to the vertex and is positioned in the vertex set of the normal state transition probability graph, substituting the two states into a formula (IV) to calculate a stateless quantitative evaluation value, adopting a formula (V) to calculate a weight corresponding to the time delay in the state, if the weight is greater than a threshold value, adopting a formula (VI) to calculate a time delay abnormal quantitative evaluation value, otherwise, entering the last step; if the state transition exists in the vertex set of the normal state transition probability graph, judging whether the state transition taking the node as a tail node in the transition set of the attack stage state transition graph exists in the transition set of the normal state transition probability graph or not, and if the state transition does not exist, calculating a conversion abnormity quantitative evaluation value by adopting a formula (VII); otherwise, judging whether the corresponding conversion frequency is the same as the corresponding frequency in the normal state transition probability chart or not, if so, calculating the abnormal evaluation value of the conversion frequency by adopting a formula (VIII), otherwise, entering the last step; finally, the final evaluation value is calculated using formula (IX).
The embodiment performs attack and evaluation tests on a water treatment industrial control safety target range platform combining virtuality and reality. The adopted attack methods are 5, which are respectively as follows: a. tampering with the data attack that the sensor sends to the controller; b. tampering with corresponding state data attacks in the controller data register; c. sending a control command to the field controlled equipment by the controller for tampering, and shortening command execution time; d. tampering the sensor equipment below a threshold value to change the control command, and hiding the tampering behavior to an engineer station through replay attack; e tampering with the sensor data to keep it at a steady level.
Starting timing from system starting, wherein attack proceeding phases respectively set by the attack modes a, b and d occur between 20 hours and 24 hours, and the corresponding attack ending phase is a time period after 24 hours; collecting data from the start of the system, wherein 34560 pieces of data are collected, and 2881 pieces of data are collected in the attack stage; the attack progress stage set by the attack mode c occurs between 303 hours and 43 minutes and 307 hours and 43 minutes, and the corresponding attack end stage is a time period after 307 hours and 43 minutes. Collecting data from the start of the system, wherein 225182 pieces of data are collected, and 2881 pieces of data are collected in the attack stage; the attack progress stage set by the attack mode e occurs between 20 hours and 24 hours, and the corresponding attack end stage is a period after 24 hours; collecting data from the start of the system, and collecting data 20160 strips in total, wherein 2881 pieces of data are occupied in the attack stage; the above five attack modes generate 5 data sets, which are denoted as data sets 1,2, 3, 4 and 5.
The data set description is shown in table 1:
TABLE 1
Figure BDA0003128679870000181
The results of the evaluation of five data sets by the method of the present invention are shown in table 2:
TABLE 2
Figure BDA0003128679870000191
Parameters involved in the influence degree calculation were selected: the weights Weit [0.45,0.45 and 0.1] corresponding to the damage degree of the T1, T2 and T3 to the state of the industrial control system, the radius expansion threshold rtord in the state feature clustering parameters is 0.06, and the radius expansion range rRange is 1.2.
Fig. 3 is a schematic diagram illustrating a comparison between the states of the continuous variables T1, T2, and T3 collected in the corresponding industrial control system in the data set 1 during normal operation and under attack in the embodiment; fig. 4 is a schematic diagram illustrating a comparison between the states of the continuous variables T1, T2, and T3 collected in the corresponding industrial control system in the data set 2 during normal operation and under attack in the embodiment; fig. 5 is a schematic diagram illustrating a comparison between the states of the continuous variables T1, T2, and T3 collected in the corresponding industrial control system in the data set 3 during normal operation and under attack in the embodiment; fig. 6 is a schematic diagram illustrating a comparison between the states of the continuous variables T1, T2, and T3 collected in the corresponding industrial control system in the data set 4 in normal operation and in attack in the embodiment; fig. 7 is a schematic diagram illustrating a comparison between the states of the continuous variables T1, T2, and T3 collected in the corresponding industrial control system in the data set 5 in normal operation and in attack in the embodiment; in fig. 3-fig. 7, the attack starting time and the attack ending time are respectively divided by vertical dashed lines, between which is the attack progress phase continuous type variable T1, T2 and T3 compare the change under attack in the case of no attack, and the second dashed line is followed by the change under attack in the case of no attack in the case of 3 continuous type variables under attack.
The results shown in table 2 are substantially identical to the continuous variables shown in fig. 3 to 7 in comparison with the attack progress stage, the attack end stage and the normal operation stage. For example, fig. 3 and 4 show that the attack end phase and the attack absence have no change in the above 3 continuous variables, and table 2 shows that in the attack modes a and b, the influence degree of the attack end phase is 0, and the influence degree of the attack end phase of the data sets 3 and 4 is obviously higher than that of the data set 5. As shown by comparing fig. 3-7, the impact should be minimal for data set 2 corresponding to fig. 4 during the attack phase, while data set 3 corresponding to fig. 5 has significantly higher impact during the attack phase than the other several data sets, consistent with the data shown in table 2. The evaluation result which is more consistent with the influence of the actual state is obtained.
Example 3
A system for quantitatively evaluating the influence of an industrial control network-oriented multi-mode attack mode on the state of an industrial control system is disclosed, as shown in FIG. 8, and is used for realizing the method for quantitatively evaluating the influence of the industrial control network-oriented multi-mode attack mode on the state of the industrial control system in the embodiment 1 or 2, and the method comprises a state data primary description and extraction unit, a clustering unit, a state transition probability graph construction unit and a quantitative evaluation unit;
the state data preliminary description and extraction unit is used for executing the step (1); the clustering unit is used for executing the step (2); the state transition probability map construction unit is used for executing the step (3); the quantitative evaluation unit is used for executing the step (4).

Claims (8)

1. A quantitative evaluation method for influence of an industrial control network-oriented multi-mode attack mode on the state of an industrial control system is characterized by comprising the following steps:
(1) performing primary description and extraction on state characteristics, namely an industrial control system state data set, and acquiring state data segmentation points;
(2) clustering the state features;
(3) constructing a state transition probability graph;
(4) quantitatively evaluating the influence of the system state based on the abnormal features and the damage degree indexes; the specific implementation process comprises the following steps:
in the attack influence quantitative evaluation method based on the abnormal characteristic and damage degree index fusion analysis, weights corresponding to the state damage degrees of the industrial control system for different continuous type variables are marked as Weit,
Figure FDA0003380335350000011
satisfies the following conditions:
Figure FDA0003380335350000012
quantitative evaluation of state anomalies, time delay anomalies, conversion anomalies, frequency anomalies was performed using the following formulas:
when the system is in normal operation, a state data set DS is obtainednor={CMnor,Dnor,TDSnorAnd (c), each item corresponds to the normal state industrial control system state data set DS ═ CM, D, TDS one to one, and the steps a to p are executed to obtain a state feature set
Figure FDA0003380335350000013
msnorIs the number of normal clusters, each term of which is associated with
Figure FDA0003380335350000014
One to one correspondence according to SnorObtained state probability graph Gnor={Vnor,Pnor(TRnor) Each item of the state probability map is in one-to-one correspondence with a state probability map G { V, P (TR) } obtained when the system operates normally;
when the system is under attack, the state data set DS is acquiredatt={CMatt,Datt,TDSattAnd (c), each item corresponds to the normal state industrial control system state data set DS ═ CM, D, TDS one to one, and the steps a to p are executed to obtain a state feature set
Figure FDA0003380335350000015
msattIs the number of clusters, each term of which is associated with
Figure FDA0003380335350000016
One to one correspondence according to SattObtained state probability graph Gatt={Vatt,Patt(TRatt) Each item of the state probability map is in one-to-one correspondence with a state probability map G { V, P (TR) } obtained when the system operates normally;
setting:
Figure FDA0003380335350000017
wherein the content of the first and second substances,
Figure FDA0003380335350000018
is a continuous type variable characteristic of the variable,
Figure FDA0003380335350000019
the characteristics of the variables of the discrete type are represented,
Figure FDA00033803353500000110
representing the time slice after the division;
Figure FDA00033803353500000111
is represented by the formulaattMiddle state
Figure FDA00033803353500000112
The closest state is obtained by the following equation (iii):
Figure FDA00033803353500000113
in the formula (III), the compound represented by the formula (III),
Figure FDA00033803353500000114
Figure FDA00033803353500000115
does not exist in the set SnorIn a direction of
Figure FDA0003380335350000021
Variable characteristics of medium discrete type and
Figure FDA0003380335350000022
the discrete type variable characteristics are the same;
the stateless quantitative evaluation formula is shown as formula (IV):
Figure FDA0003380335350000023
in the formula (IV), EVALNoIndicating a stateless quantitative evaluation value for the evaluation,
Figure FDA0003380335350000024
to represent
Figure FDA0003380335350000025
And
Figure FDA0003380335350000026
the maximum value of the middle time slice,
Figure FDA0003380335350000027
to represent
Figure FDA0003380335350000028
And
Figure FDA0003380335350000029
the smallest of the medium time slices,
Figure FDA00033803353500000210
to represent
Figure FDA00033803353500000211
And
Figure FDA00033803353500000212
the corresponding index in (a) is the maximum value of the continuous type variable of j,
Figure FDA00033803353500000213
to represent
Figure FDA00033803353500000214
And
Figure FDA00033803353500000215
the corresponding index in (1) is the minimum value of the continuous type variable of j;
is provided with
Figure FDA00033803353500000216
Figure FDA00033803353500000217
Wherein d iswit(. is a time delay characteristic weight calculation formula, τdrtRepresenting the threshold value set by the state proportion of the time delay feature, S'drtThe state delay anomaly set is specifically defined as follows:
Figure FDA00033803353500000218
Figure FDA00033803353500000219
in the formula (V), ndIs the number of discrete type variables, siDenotes SattIn a certain state, sjDenotes SnorIn a certain state, eduDist(s)i,sj) Denotes si,sjThe distance between the two or more of the two or more,
Figure FDA00033803353500000220
is siThe corresponding kth discrete-type variable value,
Figure FDA00033803353500000221
is sjThe corresponding kth discrete-type variable value,
Figure FDA00033803353500000222
is siThe corresponding value of the i-th consecutive type variable in (a),
Figure FDA00033803353500000223
is sjThe corresponding value of the i-th consecutive type variable in (a),
Figure FDA00033803353500000224
is siThe time slice in the middle time slice is,
Figure FDA00033803353500000225
is sjA middle time slice;
Figure FDA00033803353500000226
representing a state transition exception set, and meeting the following conditions:
Figure FDA00033803353500000227
denotes SnorIn a certain state, state transition relation
Figure FDA00033803353500000228
Present in TRattIn (1), however,
Figure FDA00033803353500000229
not present in TRnorPerforming the following steps;
according to the state
Figure FDA00033803353500000230
Recent state
Figure FDA00033803353500000231
Finding a normal state feature set SnorNeutralization of
Figure FDA00033803353500000232
The nearest state features are respectively recorded as
Figure FDA00033803353500000233
The quantitative evaluation formulas of the time delay abnormity and the conversion abnormity are respectively shown as formulas (VI) and (VII):
Figure FDA0003380335350000031
Figure FDA0003380335350000032
in formulae (VI) and (VII), EVALDrtRepresents the quantitative evaluation value of the time delay abnormity,
Figure FDA0003380335350000033
to represent
Figure FDA0003380335350000034
The time slice in (1) is set,
Figure FDA0003380335350000035
to represent
Figure FDA0003380335350000036
The middle index is a continuous type variable value of j,
Figure FDA0003380335350000037
to represent
Figure FDA0003380335350000038
The middle index is a continuous type variable value of j;
EVALTransan abnormal quantitative evaluation value indicating a state transition relation,
Figure FDA0003380335350000039
to represent
Figure FDA00033803353500000310
The time slice in (1) is set,
Figure FDA00033803353500000311
to represent
Figure FDA00033803353500000312
The time slice in (1) is set,
Figure FDA00033803353500000313
to represent
Figure FDA00033803353500000314
The middle index is a continuous type variable value of j,
Figure FDA00033803353500000315
to represent
Figure FDA00033803353500000316
The middle index is a continuous type variable value of j;
is provided with
Figure FDA00033803353500000317
Is a status feature
Figure FDA00033803353500000318
To the direction of
Figure FDA00033803353500000319
The abnormal frequency of the transition is such that,
Figure FDA00033803353500000320
and
Figure FDA00033803353500000321
is already present in SnorIs also present in SattIs in a certain state of (a) or (b),
Figure FDA00033803353500000322
if the frequency is a normal conversion frequency corresponding to the state conversion, the conversion frequency abnormality quantitative evaluation formula is defined as formula (VIII):
Figure FDA00033803353500000323
in the formula (VIII), EVALFreqIt represents a quantitative evaluation value of the abnormal frequency,
Figure FDA00033803353500000324
to represent
Figure FDA00033803353500000325
The time slice in (1) is set,
Figure FDA00033803353500000326
to represent
Figure FDA00033803353500000327
The time slice of (1);
the final quantitative evaluation formula of the influence of the attack on the state of the industrial control system is shown as the formula (IX):
VANC=EVALNo+EVALDrt+EVALTrans+EVALFreq(Ⅸ)
finally obtaining VANC through the formula (IX), wherein the VANC is the sum of quantitative evaluation of four abnormal conditions including no state, time delay abnormality, conversion abnormality and conversion probability abnormality.
2. The method for quantitatively evaluating the influence of the multi-mode attack mode on the state of the industrial control system, which is oriented to the industrial control network, according to claim 1, is characterized in that the specific implementation process of the step (1) comprises the following steps:
A. the method comprises the following steps of performing preliminary description on an industrial control system state data set, namely:
the industrial control system state data set is expressed as DS ═ CM, D, TDS },
Figure FDA00033803353500000328
Figure FDA00033803353500000329
TDS represents a time period, wherein TDSiIndicating a specific time, i ═ 1,2, … nt;ntIs the number of moments, and is also the length of the time period TDS;
Figure FDA0003380335350000041
CM denotes a set of continuous type variables in the industrial control system within the TDS period,
Figure FDA0003380335350000042
representing a continuous type variable, n, in an industrial control system during a TDS time periodcIs the number of continuous type variables; d represents a discrete type variable set in the industrial control system in the TDS time period,
Figure FDA0003380335350000043
representing a variable of discrete type, n, in an industrial control system within a TDS time perioddIs the number of discrete type variables;
therefore, the temperature of the molten metal is controlled,
Figure FDA0003380335350000044
Figure FDA0003380335350000045
respectively indicate correspondence in tdsjContinuous type variables and discrete type variables collected at any moment;
B. extracting the state data set of the industrial control system, namely:
data in CM were z-score normalized using formula (i):
Figure FDA0003380335350000046
in the formula (I), the compound is shown in the specification,
Figure FDA0003380335350000047
niis ciThe number of the elements in (A) and (B),
Figure FDA0003380335350000048
obtaining a new continuous state data set by formula (I)
Figure FDA0003380335350000049
C. Acquiring state data segmentation points, comprising:
a. traversing the discrete type variable set D, and when the discrete variables in the discrete type variable set D are changed, putting the serial numbers of the discrete variables which start to be changed into a discrete type variable division point list (disList);
b. traverse the new continuous state data set C', calculate Δ cci=c′i+1-c′i,Δccr+1=c′i+2-c′i+1If Δ cciNot less than 0 and Δ cci+1<0, or Δ cci<0 and Δ cci+1If the value is more than or equal to 0, putting i into a continuous type variable division point list consList;
c. merging the data in the disList and the consList to obtain the sPTs;
d. traversing the discist, for each element dPt, performing operations e through f as follows:
e. finding the element before dPt from the sPts, denoted pPt, and finding pPt corresponding continuous type variable index in the consList, denoted cIdx, in the new continuous variable data set
Figure FDA00033803353500000410
In (c), finding the continuous variable corresponding to cIdx, and recording the continuous variable as c'cIdxJudging c'cIdxIn (b), the obtained product is located at [ pPt, dPt ]]If the number of the variables in the interval is 1, pPt is deleted from the sPTs, otherwise, operation f is carried out;
f. finding the element index after dPt from the sPts, denoted as nIdx, and when nIdx is less than the total number of sPts, looping through the following operations f-1 to f-3; otherwise, exiting the loop;
f-1, finding the element value corresponding to the nIdx in the sPTs, and marking as nPt;
f-2, finding nPt corresponding continuous variable index in the consList, and recording as cIdx;
f-3, judging a continuous type variable c'cIdxIn (b), the obtained product is located at [ dPt, nPt ]]If the number of the variables in the interval is 1 or 2, nPt is deleted from the sPTs, otherwise, the loop is exited;
D. the characteristic extraction means that:
g. traversing each element Pt in sPTsiAnd element Pt behind iti+1Calculating Δ PT per time slicei=Pti+1-PtiThe number of the time slices is set as mt(ii) a Will be delta PTiIs marked as
Figure FDA0003380335350000051
A new set of time slices is formed
Figure FDA0003380335350000052
h. Traverse each time slice
Figure FDA0003380335350000053
Set of all discrete variables after time slicing
Figure FDA0003380335350000054
Wherein the content of the first and second substances,
Figure FDA0003380335350000055
Figure FDA0003380335350000056
is in time slices
Figure FDA0003380335350000057
Inner postThe collected discrete type variable set and all continuous type variable sets after time slice division are recorded as
Figure FDA0003380335350000058
Figure FDA0003380335350000059
Is shown in time slice
Figure FDA00033803353500000510
The continuous type variable set collected in the system;
in time slice
Figure FDA00033803353500000511
The discrete type variables in are identical
Figure FDA00033803353500000512
Representing time slices
Figure FDA00033803353500000513
Any one set of discrete variables in
Figure FDA00033803353500000514
Of a particular element, and therefore, use
Figure FDA00033803353500000515
To represent
Figure FDA00033803353500000516
At this time, the process of the present invention,
Figure FDA00033803353500000517
i. for each time slice
Figure FDA00033803353500000518
Computing
Figure FDA00033803353500000519
Where j is ∈ [1, n ]3],i∈[1,mt];
Figure FDA00033803353500000520
Is in time slices
Figure FDA00033803353500000521
The maximum value in the set of continuous type variables acquired,
Figure FDA00033803353500000522
is in time slices
Figure FDA00033803353500000523
Minimum value in the continuous type variable set collected;
Figure FDA00033803353500000524
representing sets of continuous variables
Figure FDA00033803353500000525
In time slice
Figure FDA00033803353500000526
The slope of (d);
j. obtaining a device state feature description set which is finally expressed as
Figure FDA00033803353500000527
Wherein
Figure FDA00033803353500000528
3. The method for quantitatively evaluating the influence of the multi-mode attack mode on the state of the industrial control system, which is oriented to the industrial control network, according to claim 2, is characterized in that the specific implementation process of the step a comprises the following steps:
a-1, setting i to 1;
a-2. judging that i ═ ndWhether the information is established or not, if so, exiting; otherwise, performing step a-3;
a-3. judgment of di=di+1If the result is true, if the result is false, putting i +1 into a discrete type variable division point list (disList), and performing the step a-4; if yes, directly performing the step a-4;
and a-4, adding 1 to i, and executing the step a-2.
4. The method for quantitatively evaluating the influence of the multi-mode attack mode on the state of the industrial control system, which is oriented to the industrial control network, according to claim 3, is characterized in that in the step (2), the state features are clustered, and the specific steps comprise:
k. initializing elements in a device state profile set
Figure FDA0003380335350000061
Wherein j is equal to [1, m ]t]The corresponding cluster number set Clrs is null, and the radius expansion threshold rTred belongs to [0.02,0.1 ]]The radius extension range rRange is in the range of [1.05,1.35 ]];
l, from
Figure FDA0003380335350000062
Selecting the point with the maximum distance from all the points as a first central point, and putting the first central point into a central point set Cts;
m, calculating
Figure FDA0003380335350000063
The minimum distance between other elements in the set and each element in the central point is formed into a set dList;
n, selecting an element iCtr corresponding to the maximum distance in the dList, and adding the iCtr into the Cts;
o, setting the updated flag to be true;
and p, when the flag is true, repeating the following steps from p-1 to p-5, otherwise, exiting:
p-1, assigning flag to false;
p-2. traversal
Figure FDA0003380335350000064
Each element in (1)
Figure FDA0003380335350000065
Finding the sum from Cts
Figure FDA0003380335350000066
Recording the index of the element with the minimum distance as c, and recording the minimum distance minDist and c;
p-3. if Clrs [ i ] is not equal to c, Clrs [ i ] is equal to c, flag is assigned to true, and step p-4 is performed; otherwise, directly executing the step p-4;
p-4. update center points in Cts to
Figure FDA0003380335350000067
The mean of all elements belonging to the cluster;
p-5. performing p-5-1 to p-5-2 for each element Cts [ j ] in Cts:
p-5-1.Rs[j]is composed of
Figure FDA0003380335350000068
All elements in (1) belonging to cluster j and center point Cts [ j]Maximum value of (d);
p-5-2. if Rs [ j ] ═ 0, then Rs [ j ] ═ 0+ rThrd is calculated, otherwise Rs [ j ] ═ 0 × rRange;
using the above clustering method, pair
Figure FDA0003380335350000069
After clustering, forming a new state feature set by taking various central points as states
Figure FDA00033803353500000610
msIs the number of clusters.
5. The method as claimed in claim 4, wherein the radius expansion threshold rtord is 0.06 and the radius expansion range rRange is 1.2.
6. The method for quantitatively evaluating the influence of the multi-mode attack mode facing the industrial control network on the state of the industrial control system according to claim 4,
Figure FDA00033803353500000611
at any two points
Figure FDA00033803353500000612
The distance between
Figure FDA00033803353500000613
The formula (II) is shown as the following formula:
Figure FDA00033803353500000614
7. the method for quantitatively evaluating the influence of the multi-mode attack mode on the state of the industrial control system, which is oriented to the industrial control network, according to claim 4, is characterized in that the specific implementation process of the step (3) is as follows:
the state transition probability map is represented as G ═ { V, p (tr) }1,v2,…,vnThe vertex set in the state transition probability graph, namely the new state feature set S generated in the step (2), is represented; TR ═ { TRi→j,i,j∈[1,n]},TRi→jRepresenting slave state viTo state vjThe transfer relationship of (1); wherein: p (TR) { P (TR)i→j),i,j∈V},
Figure FDA0003380335350000071
Representing slave state viTo state vjIn which num (TR)i→j) Is TRi→jNumber of state transitions, num (tr) Σi,j∈Vnum(TRi→j) The sum of all state transition times;
the state stored in the new state feature set S generated in the step (2)
Figure FDA0003380335350000073
Is a vertex V in the state transition probability map, according to
Figure FDA0003380335350000072
Generates a transition probability set p (tr) based on the transition relationships between the states.
8. A quantitative evaluation system for the influence of the multi-mode attack mode facing the industrial control network on the state of the industrial control system is used for realizing the quantitative evaluation method for the influence of the multi-mode attack mode facing the industrial control network on the state of the industrial control system according to any one of claims 1 to 7, and is characterized by comprising a state data primary description and extraction unit, a clustering unit, a state transition probability graph construction unit and a quantitative evaluation unit; the state data preliminary description and extraction unit is used for executing the step (1); the clustering unit is used for executing the step (2); the state transition probability map construction unit is used for executing the step (3); the quantitative evaluation unit is used for executing the step (4).
CN202110698293.5A 2021-06-23 2021-06-23 Industrial control network-oriented quantitative evaluation method and system for influence of multi-mode attack mode on state of industrial control system Active CN113486352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110698293.5A CN113486352B (en) 2021-06-23 2021-06-23 Industrial control network-oriented quantitative evaluation method and system for influence of multi-mode attack mode on state of industrial control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110698293.5A CN113486352B (en) 2021-06-23 2021-06-23 Industrial control network-oriented quantitative evaluation method and system for influence of multi-mode attack mode on state of industrial control system

Publications (2)

Publication Number Publication Date
CN113486352A CN113486352A (en) 2021-10-08
CN113486352B true CN113486352B (en) 2022-02-11

Family

ID=77935946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110698293.5A Active CN113486352B (en) 2021-06-23 2021-06-23 Industrial control network-oriented quantitative evaluation method and system for influence of multi-mode attack mode on state of industrial control system

Country Status (1)

Country Link
CN (1) CN113486352B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338236B (en) * 2022-03-01 2022-05-13 四川省商投信息技术有限责任公司 Firewall intrusion data analysis method and device
CN114884694B (en) * 2022-04-06 2023-05-30 北京北卡星科技有限公司 Industrial control network security risk assessment method based on hierarchical modeling
CN115033893B (en) * 2022-08-11 2022-12-02 创思(广州)电子科技有限公司 Information vulnerability data analysis method of improved clustering algorithm
CN115859630B (en) * 2022-12-07 2023-06-16 南京师范大学 Electric traffic coupling network vulnerability assessment method based on probability map

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331072A (en) * 2014-10-28 2015-02-04 冶金自动化研究设计院 Information security risk assessment method oriented to typical metallurgy process control system
CN106709613A (en) * 2015-07-16 2017-05-24 中国科学院信息工程研究所 Risk assessment method suitable for industrial control system
CN111552973A (en) * 2020-06-02 2020-08-18 奇安信科技集团股份有限公司 Method and device for risk assessment of equipment, electronic equipment and medium
CN112235283A (en) * 2020-10-10 2021-01-15 南方电网科学研究院有限责任公司 Vulnerability description attack graph-based network attack evaluation method for power engineering control system
CN112261042A (en) * 2020-10-21 2021-01-22 中国科学院信息工程研究所 Anti-seepage system based on attack hazard assessment
CN112367331A (en) * 2020-11-18 2021-02-12 简和网络科技(南京)有限公司 Real-time processing system and method for denial of service attack based on running state of computer system
CN112861364A (en) * 2021-02-23 2021-05-28 哈尔滨工业大学(威海) Industrial control system equipment behavior modeling method and device based on state delay transition diagram secondary annotation

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11121952B2 (en) * 2018-10-17 2021-09-14 Cisco Technology, Inc. Device health assessment data summarization using machine learning
CN112291239B (en) * 2020-10-29 2021-09-07 东北大学 Network physical model facing SCADA system and intrusion detection method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331072A (en) * 2014-10-28 2015-02-04 冶金自动化研究设计院 Information security risk assessment method oriented to typical metallurgy process control system
CN106709613A (en) * 2015-07-16 2017-05-24 中国科学院信息工程研究所 Risk assessment method suitable for industrial control system
CN111552973A (en) * 2020-06-02 2020-08-18 奇安信科技集团股份有限公司 Method and device for risk assessment of equipment, electronic equipment and medium
CN112235283A (en) * 2020-10-10 2021-01-15 南方电网科学研究院有限责任公司 Vulnerability description attack graph-based network attack evaluation method for power engineering control system
CN112261042A (en) * 2020-10-21 2021-01-22 中国科学院信息工程研究所 Anti-seepage system based on attack hazard assessment
CN112367331A (en) * 2020-11-18 2021-02-12 简和网络科技(南京)有限公司 Real-time processing system and method for denial of service attack based on running state of computer system
CN112861364A (en) * 2021-02-23 2021-05-28 哈尔滨工业大学(威海) Industrial control system equipment behavior modeling method and device based on state delay transition diagram secondary annotation

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
《一种改进的网络安全态势量化评估方法》;席荣荣等;《计算机学报》;20150430;第38卷(第4期);第749-758页 *
《基于故障的系统安全风险分析与评估方法研究》;刘学敏;《中国博士学位论文全文数据库(工程科技I辑)》;20151115;第B026-1页 *
《针对网络攻击的配电网信息物理系统风险量化评估》;张宇航等;《电力系统自动化》;20191110;第43卷(第21期);第12-22页 *

Also Published As

Publication number Publication date
CN113486352A (en) 2021-10-08

Similar Documents

Publication Publication Date Title
CN113486352B (en) Industrial control network-oriented quantitative evaluation method and system for influence of multi-mode attack mode on state of industrial control system
CN111596604B (en) Intelligent fault diagnosis and self-healing control system and method for engineering equipment based on digital twinning
CN112202736B (en) Communication network anomaly classification method based on statistical learning and deep learning
CN108564254B (en) Power distribution equipment state visualization platform based on big data
CN105203876B (en) It is a kind of to utilize support vector machines and the transformer online monitoring state evaluating method of correlation analysis
CN114429153B (en) Gear box increment fault diagnosis method and system based on life learning
CN105425768B (en) A kind of second power equipment monitoring device and method
CN105467971B (en) A kind of second power equipment monitoring system and method
CN103728507A (en) Grid fault diagnosis method based on data mining
CN110570012B (en) Storm-based power plant production equipment fault early warning method and system
CN106682835B (en) Data-driven complex electromechanical system service quality state evaluation method
CN103425874B (en) A kind of Space Vehicle Health appraisal procedure based on profust reliability theory
CN111652479A (en) Data driving method for dynamic security assessment of power system
CN106096789A (en) A kind of based on machine learning techniques can be from the abnormal industry control security protection of perception and warning system
CN117196159A (en) Intelligent water service partition metering system based on Internet big data analysis
CN110022313B (en) Polymorphic worm feature extraction and polymorphic worm identification method based on machine learning
CN113708350B (en) Cloud edge cooperation-based power distribution area heavy overload abnormality judgment method and system
CN116853056A (en) Charging pile intelligent management system based on data analysis
CN116206499A (en) Power equipment scene simulation method and device for power grid maintenance training
CN103337000B (en) A kind of safe monitoring and pre-alarming method of oil-gas gathering and transportation system
CN105469644A (en) Flight conflict resolution method and flight conflict resolution device
CN115864644A (en) Relay protection device state evaluation method, system, equipment and medium
CN113159503B (en) Remote control intelligent safety evaluation system and method
CN106326278A (en) Data exception judgment method and device
CN114266370A (en) Method and system for generating fault handling plan of power grid equipment in typhoon meteorological environment on line and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant