CN115037508B - A multi-step attack modeling method and system for industrial control systems - Google Patents
A multi-step attack modeling method and system for industrial control systems Download PDFInfo
- Publication number
- CN115037508B CN115037508B CN202210438285.1A CN202210438285A CN115037508B CN 115037508 B CN115037508 B CN 115037508B CN 202210438285 A CN202210438285 A CN 202210438285A CN 115037508 B CN115037508 B CN 115037508B
- Authority
- CN
- China
- Prior art keywords
- attack
- graph
- vulnerability
- information
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000004458 analytical method Methods 0.000 claims abstract description 16
- 238000012545 processing Methods 0.000 claims abstract description 11
- 238000010586 diagram Methods 0.000 claims description 18
- 238000004891 communication Methods 0.000 claims description 10
- 238000013461 design Methods 0.000 claims description 7
- 238000010276 construction Methods 0.000 claims description 5
- 238000010845 search algorithm Methods 0.000 claims description 4
- 230000000717 retained effect Effects 0.000 claims 1
- 238000005516 engineering process Methods 0.000 description 24
- 230000008569 process Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 9
- 239000000243 solution Substances 0.000 description 6
- 230000006399 behavior Effects 0.000 description 4
- 239000011159 matrix material Substances 0.000 description 4
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 238000004886 process control Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000005316 response function Methods 0.000 description 1
- 230000001629 suppression Effects 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
一种面向工业控制系统的多步攻击建模方法及系统,其包括进行系统拓扑分析和系统漏洞处理以生成攻击图;根据各物理组件设备的功能依赖关系构建与或图;根据攻击图和与或图生成与或攻击图;对与或攻击图进行扩展,其解决了现有的攻击建模方法存在着复杂性较高的技术问题,且本发明使得安全分析人员从全局掌握攻击者行为及其意图,充分了解工控系统当前所面临的威胁情况,可广泛应用于大数据处理领域。
A multi-step attack modeling method and system for industrial control systems, which includes performing system topology analysis and system vulnerability processing to generate an attack graph; constructing an AND or graph according to the functional dependencies of each physical component device; according to the attack graph and AND The OR graph generates an AND or attack graph; expanding the AND or attack graph solves the technical problem of high complexity in the existing attack modeling method, and the invention enables security analysts to grasp the attacker's behavior and Its intention is to fully understand the threat situation that the industrial control system is currently facing, and can be widely used in the field of big data processing.
Description
技术领域technical field
本发明涉及大数据处理领域,尤其是涉及一种面向工业控制系统的多步攻击建模方法及系统。The invention relates to the field of big data processing, in particular to a multi-step attack modeling method and system for industrial control systems.
背景技术Background technique
工业控制系统与互联网技术不断融合,原有的封闭环境逐渐被打破,此外,工控系统原有的组态软件、通信协议、可编程逻辑控制器、执行器等同样存在着安全漏洞。近年来,针对工控系统的安全事件往往综合利用多个漏洞组合成多步攻击,最终影响工控系统物理执行层设备的正常运作。因此,对多个漏洞组合攻击以及非联网设备进行攻击建模,使得威胁分析人员能够及时掌握当前环境下的安全情况尤为重要。目前,针对工控系统的攻击建模方法有传统攻击建模方法和新型攻击建模方法等。The continuous integration of industrial control systems and Internet technologies has gradually broken the original closed environment. In addition, the original configuration software, communication protocols, programmable logic controllers, actuators, etc. of industrial control systems also have security loopholes. In recent years, security incidents targeting industrial control systems often combine multiple vulnerabilities into multi-step attacks, which ultimately affect the normal operation of the physical execution layer of the industrial control system. Therefore, it is particularly important to model attacks combined with multiple vulnerabilities and non-networked devices so that threat analysts can keep abreast of the security situation in the current environment. At present, attack modeling methods for industrial control systems include traditional attack modeling methods and new attack modeling methods.
传统攻击建模方法包括攻击树和攻击图方法等。攻击树模型通过根节点和叶节点展示攻击行为与结果,从根节点到叶节点的路径即为攻击路径。在分析复杂多步攻击进行时,攻击树显露出数据结构庞大、分析效率低等不足。攻击图模型能够比攻击树模型展示更复杂的攻击情况,可以枚举攻击者能成功到达的所有可能路径并实现可视化,是分析多步骤组合攻击的重要工具。然而攻击图往往利用网络可达行关系生成,缺少考虑到工控系统物理过程层的非联网设备。此外,传统攻击建模方法往往聚焦于系统脆弱性的具体信息,忽略了攻击者的全局攻击目的以及攻击行为之间的关联,使得安全分析人员在理解攻击场景时具有一定的困难。Traditional attack modeling methods include attack tree and attack graph methods, etc. The attack tree model displays the attack behavior and results through the root node and the leaf node, and the path from the root node to the leaf node is the attack path. When analyzing complex multi-step attacks, the attack tree reveals shortcomings such as huge data structure and low analysis efficiency. The attack graph model can display more complex attack situations than the attack tree model. It can enumerate and visualize all possible paths that the attacker can successfully reach. It is an important tool for analyzing multi-step combined attacks. However, the attack graph is often generated using the network reachability relationship, and lacks the non-networked devices that consider the physical process layer of the industrial control system. In addition, traditional attack modeling methods often focus on the specific information of system vulnerabilities, ignoring the attacker's global attack purpose and the correlation between attack behaviors, making it difficult for security analysts to understand attack scenarios.
针对近年来频发的APT新型攻击,杀伤链、MITRE ATT&CK模型等被相继提出。杀伤链模型基于攻击生命周期从较高抽象层次展示攻击者目标和防护系统风险,难以表达具体的攻击行为及其所关联的具体数据、防护措施、配置资源等。MITRE ATT&CK模型在杀伤链模型基础上,围绕战术、技术和流程从抽象目的、实施技术到具体实例对攻击进行了描述,更贴近真实攻击者的行为。虽然MITRE ATT&CK模型为攻击实现提供了详细分析,但详细的自然语言使得机器难以理解,在一定程度上增加了攻击分析的复杂性。In response to the frequent new APT attacks in recent years, kill chains, MITER ATT&CK models, etc. have been proposed one after another. Based on the attack life cycle, the kill chain model shows the attacker's goal and the risk of the protection system from a higher level of abstraction, and it is difficult to express the specific attack behavior and its associated specific data, protection measures, configuration resources, etc. Based on the kill chain model, the MITER ATT&CK model describes attacks from abstract purpose, implementation technology to specific examples around tactics, techniques and processes, which is closer to the behavior of real attackers. Although the MITER ATT&CK model provides detailed analysis for attack implementation, the detailed natural language makes it difficult for machines to understand, which increases the complexity of attack analysis to a certain extent.
发明内容Contents of the invention
为解决上述技术问题,本发明提供一种面向工业控制系统的多步攻击建模方法及系统。In order to solve the above technical problems, the present invention provides a multi-step attack modeling method and system for industrial control systems.
本申请实施例的第一方面提供了一种面向工业控制系统的多步攻击建模方法,其包括:The first aspect of the embodiment of the present application provides a multi-step attack modeling method for industrial control systems, which includes:
进行系统拓扑分析和系统漏洞处理以生成攻击图;Perform system topology analysis and system vulnerability processing to generate attack graphs;
根据各物理组件设备的功能依赖关系构建与或图;Construct an AND or graph according to the functional dependencies of each physical component device;
根据所述攻击图和所述与或图生成与或攻击图;generating an AND-OR attack graph based on the attack graph and the AND-OR graph;
对所述与或攻击图进行扩展。The AND-OR attack graph is extended.
优选的,所述攻击图的生成,具体通过以下方式实现:Preferably, the generation of the attack graph is specifically implemented in the following ways:
通过系统网络拓扑分析掌握系统设备信息和初始拓扑结构,利用拓扑扫描和漏洞扫描工具更新拓扑信息,收集漏洞信息;根据安全信息库抽取漏洞的前后置条件、影响产品、攻击模式、攻击后果信息,基于设备、拓扑和漏洞信息,采用广度优先搜索算法生成联网设备攻击图。Grasp system equipment information and initial topology structure through system network topology analysis, use topology scanning and vulnerability scanning tools to update topology information, and collect vulnerability information; extract pre- and post-conditions, affected products, attack modes, and attack consequences information of vulnerabilities based on the security information base. Based on device, topology and vulnerability information, a breadth-first search algorithm is used to generate an attack graph of networked devices.
优选的,所述系统拓扑分析,具体通过以下方式实现:Preferably, the system topology analysis is specifically implemented in the following ways:
分析系统设计文档中的系统设备及其连接关系,获得初始阶段的系统拓扑结构,并收集设备的网络信息,使用扫描工具在不影响系统正常工作的情况下对工控设备进行探测,更新工控系统拓扑结构,从而更新所述的攻击图;同时,根据扫描结果、配置文件提取并保存设备IP、类型、厂商、通信信息。Analyze the system equipment and its connection relationship in the system design document, obtain the system topology structure in the initial stage, and collect the network information of the equipment, use the scanning tool to detect the industrial control equipment without affecting the normal operation of the system, and update the topology of the industrial control system structure, thereby updating the attack graph; at the same time, extract and save device IP, type, manufacturer, and communication information according to scanning results and configuration files.
优选的,所述系统漏洞处理,具体通过以下方式实现:Preferably, the system vulnerability processing is specifically implemented in the following ways:
基于已获得的系统设备信息以及网络信息,使用漏洞扫描工具在不影响系统正常工作的情况下对系统进行扫描,收集漏洞信息,针对通信漏洞,提取并保存漏洞名称、源IP、目的IP、子网、通信协议信息;针对设备漏洞信息,从安全信息源中收集漏洞描述,从中提取漏洞编号、漏洞产品、漏洞类型、前后置条件、攻击模式、攻击后果并保存。Based on the obtained system equipment information and network information, use the vulnerability scanning tool to scan the system without affecting the normal operation of the system, collect vulnerability information, and extract and save the vulnerability name, source IP, destination IP, Network and communication protocol information; for device vulnerability information, collect vulnerability descriptions from security information sources, extract vulnerability numbers, vulnerability products, vulnerability types, pre- and post-conditions, attack modes, and attack consequences and save them.
优选的,所述与或图的构建,具体通过以下方式实现:Preferably, the construction of the AND-OR graph is specifically implemented in the following ways:
针对非联网设备,根据系统设计文档、配置文件获得PLC、传感器、执行器的物理组件设备信息,读取PLC程序,获得PLC、传感器、执行器之间的功能依赖关系构建与或图。For non-networked devices, obtain the physical component equipment information of PLC, sensors, and actuators according to the system design documents and configuration files, read the PLC program, and obtain the functional dependency construction and/or diagram among PLC, sensors, and actuators.
优选的,所述与或攻击图的生成,具体通过以下方式实现:Preferably, the generation of the AND-OR attack graph is specifically implemented in the following manner:
通过判断所述攻击图中的控制设备漏洞是否影响其在与或图中所连接的物理设备生成所述与或攻击图。The and-or attack graph is generated by judging whether the vulnerability of the control device in the attack graph affects its connected physical devices in the and-or graph.
优选的,所述攻击图由节点和有向边组成,节点包括设备节点、漏洞节点和中间节点,首先确定攻击图中的控制设备和与或图中的控制设备的对应关系,然后判断攻击图中控制设备的漏洞攻击后果是否将影响与或图中的控制设备所连接的其它设备,若有影响则保留被影响的设备,并将AND节点或OR节点转化成两设备间的and或or边,若两个设备之间具有两个逻辑节点直接相连的情况,则将这两个逻辑节点和它们之间的边转化成中间节点,并按照逻辑节点添加and或or边,生成的AND/OR攻击图。Preferably, the attack graph is composed of nodes and directed edges, the nodes include device nodes, vulnerability nodes and intermediate nodes, first determine the corresponding relationship between the control device in the attack graph and the control device in the graph, and then judge the attack graph Whether the vulnerability attack consequences of the control device in the figure will affect other devices connected to or the control device in the figure, if so, keep the affected device, and convert the AND node or OR node into an and or or edge between the two devices , if there are two logical nodes directly connected between two devices, convert the two logical nodes and the edges between them into intermediate nodes, and add and or or edges according to the logical nodes, and the generated AND/OR Attack graph.
优选的,所述与或攻击图的扩展,具体通过以下方式实现:Preferably, the extension of the AND-OR attack graph is specifically implemented in the following ways:
利用面向对象的攻击描述,通过匹配漏洞信息和攻击信息,对所述与或攻击图进行扩展。Using the object-oriented attack description, the AND-OR attack graph is extended by matching vulnerability information and attack information.
本申请的第二方面提供了一种面向工业控制系统的多步攻击建模系统,包括:The second aspect of the present application provides a multi-step attack modeling system for industrial control systems, including:
攻击图生成模块:用于进行系统拓扑分析和系统漏洞处理以生成攻击图;Attack graph generation module: used for system topology analysis and system vulnerability processing to generate attack graphs;
与或图构建模块:用于根据各物理组件设备的功能依赖关系构建与或图;AND-OR graph building block: used to build AND-OR graphs according to the functional dependencies of each physical component device;
与或攻击图生成模块:用于根据所述攻击图和所述与或图生成与或攻击图;And or attack graph generating module: used for generating an AND or attack graph according to the attack graph and the AND or graph;
扩展模块:用于对所述与或攻击图进行扩展。Extension module: used to extend the AND or attack graph.
本发明利用漏洞信息结合联网设备攻击图和非联网设备与或图,构成覆盖工控系统整体设备的与或攻击图;使用面向对象语言对ATT&CK Matri知识库进行描述,为与或攻击图添加攻击战术、技术和流程信息以描述多步攻击信息,使得安全分析人员能够从全局掌握工控系统安全状况;通过对攻击知识实现面向对象的语言描述,可扩展与泛化;可针对工控系统联网设备和非联网设备生成多步攻击图;可从较具体的漏洞层面和较抽象的战术、技术和流程层面展示攻击图。The present invention combines the networked equipment attack graph and the non-networked device AND or graph by using the vulnerability information to form an AND or attack graph covering the overall equipment of the industrial control system; using an object-oriented language to describe the ATT&CK Matri knowledge base, and adding attack tactics to the AND or attack graph , technical and process information to describe multi-step attack information, so that security analysts can grasp the security status of the industrial control system from a global perspective; through object-oriented language description of attack knowledge, it can be extended and generalized; it can target industrial control system networking equipment and non- Networked devices generate a multi-step attack graph; attack graphs can be presented at a more specific vulnerability level and at a more abstract tactical, technical, and process level.
附图说明Description of drawings
图1为本申请一实施例提供的一种面向工业控制系统的多步攻击建模方法的流程示意图;FIG. 1 is a schematic flow diagram of a multi-step attack modeling method for industrial control systems provided by an embodiment of the present application;
图2为本申请一实施例提供的工业控制系统拓扑结构示意图;FIG. 2 is a schematic diagram of a topology structure of an industrial control system provided by an embodiment of the present application;
图3为本申请一实施例提供的攻击图示意图;FIG. 3 is a schematic diagram of an attack graph provided by an embodiment of the present application;
图4为本申请一实施例提供的工业控制系统AND/OR拓扑示意图;FIG. 4 is a schematic diagram of an AND/OR topology of an industrial control system provided by an embodiment of the present application;
图5为本申请一实施例提供的生成与或攻击图的流程示意图;FIG. 5 is a schematic flow diagram of generating and or attack graphs provided by an embodiment of the present application;
图6为本申请一实施例提供的与或攻击图示意图;FIG. 6 is a schematic diagram of an AND-OR attack graph provided by an embodiment of the present application;
图7为本申请一实施例提供的工控系统资产类关系图;FIG. 7 is an asset class relationship diagram of an industrial control system provided by an embodiment of the present application;
图8为本申请一实施例提供的ATT&CK Matrix与攻击类的对应关系;Fig. 8 is the corresponding relationship between ATT&CK Matrix and attack class provided by an embodiment of the present application;
图9为本申请一实施例提供的资产攻击描述示意图;FIG. 9 is a schematic diagram of an asset attack description provided by an embodiment of the present application;
图10为本申请一实施例提供的漏洞攻击关系图;FIG. 10 is a relationship diagram of vulnerability attacks provided by an embodiment of the present application;
图11为本申请一实施例提供的与或扩展攻击路径示意图;FIG. 11 is a schematic diagram of an AND or extension attack path provided by an embodiment of the present application;
图12为本申请一实施例提供的一种面向工业控制系统的多步攻击建模系统的结构示意图。Fig. 12 is a schematic structural diagram of a multi-step attack modeling system oriented to an industrial control system provided by an embodiment of the present application.
具体实施方式Detailed ways
为了使本申请所要解决的技术问题、技术方案及有益效果更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the technical problems, technical solutions and beneficial effects to be solved by the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
请参阅图1,为本申请一实施例提供的一种面向工业控制系统的多步攻击建模方法的流程示意图,为了便于说明,仅示出了与本实施例相关的部分,详述如下:Please refer to FIG. 1 , which is a schematic flowchart of a multi-step attack modeling method for industrial control systems provided by an embodiment of the present application. For the convenience of description, only the parts related to this embodiment are shown, and the details are as follows:
在其中一实施例中,一种面向工业控制系统的多步攻击建模方法,包括以下步骤:In one of the embodiments, a multi-step attack modeling method for industrial control systems includes the following steps:
S101:进行系统拓扑分析和系统漏洞处理以生成攻击图。S101: Perform system topology analysis and system vulnerability processing to generate an attack graph.
具体地,通过系统网络拓扑分析掌握系统设备信息和初始拓扑结构,利用拓扑扫描和漏洞扫描工具更新拓扑信息,收集漏洞信息;根据安全信息库抽取漏洞的前后置条件、影响产品、攻击模式、攻击后果信息,基于设备、拓扑和漏洞信息,采用广度优先搜索算法生成联网设备攻击图。Specifically, grasp system equipment information and initial topology structure through system network topology analysis, use topology scanning and vulnerability scanning tools to update topology information, and collect vulnerability information; extract pre- and post-conditions of vulnerabilities, affected products, attack modes, attack Consequence information, based on device, topology, and vulnerability information, uses a breadth-first search algorithm to generate an attack graph for networked devices.
S1011:系统拓扑分析S1011: System topology analysis
如图2所示,以工业控制系统为例,分析系统设计文档中的系统设备及其连接关系,获得初始阶段的系统拓扑结构,并收集设备的网络信息。考虑系统在实际生产过程中可能发生变化,可以使用多种扫描工具在不影响系统正常工作的情况下对工控设备进行探测,更新工控系统拓扑结构,从而更新后文所述的攻击图。同时,根据扫描结果、配置文件等提取并保存设备IP、类型、厂商、通信等信息。As shown in Figure 2, taking the industrial control system as an example, analyze the system equipment and its connection relationship in the system design document, obtain the system topology in the initial stage, and collect the network information of the equipment. Considering that the system may change during the actual production process, various scanning tools can be used to detect industrial control equipment without affecting the normal operation of the system, update the topology of the industrial control system, and update the attack graph described later. At the same time, extract and save device IP, type, manufacturer, communication and other information based on scan results and configuration files.
S1012:系统漏洞处理S1012: System vulnerability handling
基于已获得的系统设备信息以及网络信息,使用多种漏洞扫描工具在不影响系统正常工作的情况下对系统进行扫描,收集漏洞信息。针对通信漏洞,提取并保存漏洞名称、源IP、目的IP、子网、通信协议等信息;针对设备漏洞信息,从CVE、CNNVD、CWE、CAPEC等安全信息源中收集漏洞描述,从中提取漏洞编号、漏洞产品、漏洞类型、前后置条件、攻击模式、攻击后果并保存。Based on the obtained system equipment information and network information, use a variety of vulnerability scanning tools to scan the system and collect vulnerability information without affecting the normal operation of the system. For communication vulnerabilities, extract and save vulnerability name, source IP, destination IP, subnet, communication protocol and other information; for device vulnerability information, collect vulnerability descriptions from security information sources such as CVE, CNNVD, CWE, CAPEC, and extract vulnerability numbers from them , vulnerability products, vulnerability types, pre- and post-conditions, attack modes, attack consequences and save them.
其中,漏洞编号指CVE编号或抽象漏洞类型;漏洞产品指存在漏洞的产品,例如远程连接服务、操作系统、通信协议、编程软件等;前后置条件指漏洞利用的条件;漏洞类型指漏洞的类型;攻击模式来自CAPEC,指利用漏洞可能采取的方法;攻击后果指利用漏洞可能所产生的后果,例如篡改、注入等破坏完整性的后果;提权等破坏访问控制的后果;数据、文件读取破坏机密性的后果;拒绝服务、系统崩溃等破坏可用性的后果。Among them, the vulnerability number refers to the CVE number or the abstract vulnerability type; the vulnerability product refers to the product with the vulnerability, such as remote connection service, operating system, communication protocol, programming software, etc.; the precondition refers to the condition of exploiting the vulnerability; the vulnerability type refers to the type of vulnerability ;Attack mode comes from CAPEC, which refers to the possible methods of exploiting vulnerabilities; attack consequences refer to the possible consequences of exploiting vulnerabilities, such as tampering, injection and other consequences of destroying integrity; privilege escalation and other consequences of destroying access control; data and file reading Consequences of breach of confidentiality; consequences of breach of availability, denial of service, system crashes, etc.
S1013:攻击图的生成S1013: Generation of attack graph
攻击图由节点和有向边组成,节点包括设备节点、网络节点和漏洞节点,边是连接节点的有向边,包括has和reach两类。设备节点由设备信息DEV进行描述DEV=(设备IP、设备名称、设备类型、漏洞集合),漏洞节点由漏洞信息VUL进行描述VUL=(漏洞编号、漏洞产品、漏洞类型、攻击模式、攻击后果),一个设备可能拥有多个漏洞,将设备节点与漏洞节点之间的有向边定义为has关系,设备和设备之间的边定义为reach关系。基于系统拓扑分析、设备漏洞处理结果,生成设备信息表如表1、漏洞信息表如表2和设备可达关系表如表3,在设备可达关系表中,1表示可达,0表示不可达。The attack graph consists of nodes and directed edges. Nodes include device nodes, network nodes, and vulnerability nodes. Edges are directed edges connecting nodes, including has and reach. The device node is described by the device information DEV=(device IP, device name, device type, vulnerability set), and the vulnerability node is described by the vulnerability information VUL=(vulnerability number, vulnerability product, vulnerability type, attack mode, attack consequence) , a device may have multiple vulnerabilities, the directed edge between the device node and the vulnerability node is defined as has relationship, and the edge between devices is defined as reach relationship. Based on the system topology analysis and device vulnerability processing results, generate a device information table as shown in Table 1, a vulnerability information table as shown in Table 2, and a device reachable relationship table as shown in Table 3. In the device reachable relationship table, 1 means reachable and 0 means unavailable Da.
表1设备信息表Table 1 Equipment Information Table
表2漏洞信息表Table 2 Vulnerability information table
表3-3设备可达关系表Table 3-3 Device reachability relationship table
构造攻击图时可根据具体的攻击场景选择攻击接入点。本申请将PC1作为攻击接入点,采取广度优先搜索算法构建包含多个漏洞的攻击图,读取设备信息、漏洞信息、设备可达性信息,添加设备节点以及漏洞节点,在设备及其漏洞之间添加has边,从PC1开始,遍历该节点的所有可达节点,对于所有可达节点,遍历其漏洞信息,若当前节点的漏洞后置条件满足可达节点的漏洞前置条件,则在两设备节点间添加reach边,标记已遍历的节点,直至所有节点都被标记。根据单调性原则处理图中的环,并删除不在攻击路径上的设备和未被利用的漏洞节点。本申请生成的攻击图示意如图3所示,其中设备节点由设备名称标识,漏洞节点由漏洞编号标识。When constructing the attack graph, the attack access point can be selected according to the specific attack scenario. This application uses PC1 as the attack access point, adopts the breadth-first search algorithm to construct an attack graph containing multiple vulnerabilities, reads device information, vulnerability information, and device reachability information, adds device nodes and vulnerability nodes, Add a has edge between them, starting from PC1, traverse all reachable nodes of this node, and traverse its vulnerability information for all reachable nodes, if the vulnerability postcondition of the current node meets the vulnerability precondition of the reachable node, then in Add a reach edge between two device nodes, and mark the traversed nodes until all nodes are marked. The cycle in the graph is processed according to the principle of monotonicity, and the devices that are not on the attack path and the unexploited vulnerability nodes are deleted. The attack diagram generated by this application is shown in Figure 3, in which the device node is identified by the device name, and the vulnerability node is identified by the vulnerability number.
S102:根据各物理组件设备的功能依赖关系构建与或图。S102: Construct an AND-OR graph according to the functional dependencies of each physical component device.
具体地,针对非联网设备,根据系统设计文档、配置文件获得PLC、传感器、执行器等物理组件设备信息,读取PLC程序,获得PLC、传感器、执行器之间的功能依赖关系构建与或图。Specifically, for non-networked devices, according to system design documents and configuration files, obtain physical component equipment information such as PLC, sensors, and actuators, read PLC programs, and obtain functional dependencies between PLCs, sensors, and actuators. .
本申请将与或(AND/OR)图表示为G={V,E},V表示节点集合V={N∪L},E表示连接节点的有向边集合E={EN,N∪EN,L∪EL,N∪EN,L∪EL,L},其中N表示PLC、执行器、传感器等物理设备集合;L表示逻辑连接词AND和OR的集合;EN,N={(m,n),m,n∈N}为物理设备之间的边,表示节点n需要节点m提供所需资源才能正常运行;EN,L={(m,n),m∈N,n∈L}表示AND/OR节点的输入是节点m;EL,N={(n,m),m∈N,n∈L}表示从AND/OR节点输出到m,若n为OR节点,则在至少满足OR节点的一个输入时,m正常工作,若n为AND节点,则在满足AND节点的所有输入时m正常工作;EL,N={(m,n),m,n∈L}表示AND/OR节点之间的连接。This application expresses the AND/OR graph as G={V,E}, V represents the node set V={N∪L}, and E represents the directed edge set E={E N,N ∪ E N,L ∪E L,N ∪E N,L ∪E L,L }, where N represents a collection of physical devices such as PLCs, actuators, sensors, etc.; L represents a collection of logical connectives AND and OR; E N,N ={(m,n),m,n∈N} is the edge between physical devices, indicating that node n needs the required resources provided by node m to operate normally; E N,L ={(m,n),m∈ N,n∈L} means that the input of AND/OR node is node m; E L,N ={(n,m),m∈N,n∈L} means output from AND/OR node to m, if n is OR node, then when at least one input of the OR node is satisfied, m works normally; if n is an AND node, then m works normally when all the inputs of the AND node are satisfied; E L,N ={(m,n),m ,n∈L} represents the connection between AND/OR nodes.
如图4所示为工业控制系统AND/OR拓扑示意图,执行器依赖PLC的输出而工作;PLC有两种方式可以正常工作,一种是利用传感器1和传感器2的读数,另一种是利用传感器2和传感器3的读数。Figure 4 is a schematic diagram of the AND/OR topology of an industrial control system. The actuator relies on the output of the PLC to work; there are two ways for the PLC to work normally, one is to use the readings of sensors 1 and 2, and the other is to use Readings from Sensor 2 and Sensor 3.
S103:根据攻击图和与或图生成与或攻击图。S103: Generate an AND-OR attack graph according to the attack graph and the AND-OR graph.
具体地,在工控系统中,非联网设备通常由控制设备控制,因此根据控制设备漏洞是否影响其所连接的物理设备的功能,可以对联网设备和非联网设备进行攻击建模,即通过判断攻击图中的控制设备漏洞是否影响其在AND/OR图中所连接的物理设备生成AND/OR攻击图。Specifically, in industrial control systems, non-networked devices are usually controlled by the control device, so according to whether the vulnerability of the control device affects the function of the physical device it is connected to, attack modeling can be performed on the networked device and the non-networked device, that is, by judging the attack Whether the vulnerability of the control device in the graph affects the physical devices connected to it in the AND/OR graph generates an AND/OR attack graph.
AND/OR攻击图由节点和有向边组成,节点包括设备节点、漏洞节点和中间节点,设备节点和漏洞节点信息如表1和表2所示,为了表述方便,将两个直接相连的AND/OR逻辑节点及其之间的边表示为中间节点,不具有实际意义,边包括has、reach、and、or和execute,and表示该边的终点设备正常工作需要满足它所连接的所有and边的起点设备,or表示该边的终点设备正常工作需要满足它所连接的至少一条or边的起点设备,execute表示终点设备的正常工作需要起点设备提供正常资源。The AND/OR attack graph is composed of nodes and directed edges. The nodes include device nodes, vulnerability nodes and intermediate nodes. The information of device nodes and vulnerability nodes is shown in Table 1 and Table 2. For the convenience of expression, two directly connected AND /OR Logical nodes and the edges between them are represented as intermediate nodes, which have no practical significance. The edges include has, reach, and, or, and execute. And means that the terminal device of this edge needs to satisfy all the and edges it connects to. or means that the normal operation of the end device of this side needs to meet the starting device of at least one or side connected to it, and execute means that the normal operation of the end device requires the normal resources provided by the starting device.
如图5所示为生成与或攻击图的流程示意图,首先确定攻击图中的控制设备和与或图中的控制设备的对应关系,然后判断攻击图中控制设备的漏洞攻击后果是否将影响与或图中的控制设备所连接的其它设备,若有影响则保留被影响的设备,并将AND节点或OR节点转化成两设备间的and或or边,若两个设备之间具有两个逻辑节点直接相连的情况,则将这两个逻辑节点和它们之间的边转化成中间节点,并按照逻辑节点添加and或or边,生成的AND/OR攻击图如图6所示,图6中以设备名称表示设备,以漏洞编号表示漏洞。Figure 5 is a schematic flow chart of generating an AND or attack graph. First, determine the corresponding relationship between the control device in the attack graph and the control device in the AND or graph, and then determine whether the vulnerability attack consequences of the control device in the attack graph will affect the AND or attack graph. Or other devices connected to the control device in the figure, if there is an influence, keep the affected device, and convert the AND node or OR node into an and or or edge between the two devices, if there are two logic between the two devices If the nodes are directly connected, convert the two logical nodes and the edges between them into intermediate nodes, and add and or or edges according to the logical nodes. The generated AND/OR attack graph is shown in Figure 6, and in Figure 6 The device is represented by the device name, and the vulnerability is represented by the vulnerability number.
S104:对与或攻击图进行扩展。S104: Extend the AND-OR attack graph.
具体地,利用面向对象的攻击描述,通过匹配漏洞信息和攻击信息,对所述与或攻击图进行扩展。Specifically, the AND-OR attack graph is extended by matching vulnerability information and attack information by using an object-oriented attack description.
首先将攻击描述的对象确定为工控资产和对应的攻击。针对常见的工控系统,工控资产包括工控设备和工控网络。其中工控设备可以泛化为控制器、I/O服务器、安全仪表系统(SIS)、历史数据库、工程师站、控制服务器、人机界面以及安全防护设备。因此,构建抽象设备类和抽象网络类,设备之间需要网络进行通信。抽象设备类可泛化为通用设备类和工控设备类,抽象网络类可泛化为通用网络类和工控网络类,工控资产类又可泛化为控制器类、I/O服务器类、SIS类、历史数据库类、工程师站类、控制服务器类、人机界面类以及安全防护设备类,各资产类继承和关联关系如图7所示,此外每个资产类都拥有资产描述属性,用于介绍资产。Firstly, the object of the attack description is determined as the industrial control assets and the corresponding attack. For common industrial control systems, industrial control assets include industrial control equipment and industrial control networks. Among them, industrial control equipment can be generalized into controllers, I/O servers, safety instrumented systems (SIS), historical databases, engineer stations, control servers, man-machine interfaces, and safety protection equipment. Therefore, to construct abstract device classes and abstract network classes, a network is required for communication between devices. The abstract device class can be generalized into general device class and industrial control device class, the abstract network class can be generalized into general network class and industrial control network class, and the industrial control asset class can be generalized into controller class, I/O server class, and SIS class , historical database class, engineer station class, control server class, man-machine interface class, and security protection equipment class. The inheritance and association relationship of each asset class is shown in Figure 7. In addition, each asset class has an asset description attribute for introduction assets.
攻击对象由ATT&CK Matrix中的战术、技术及流程表示。战术(Tatic)在ATT&CKMatrix中表现为矩阵列名,指攻击者使用技术的目的;技术(Technology)在ATT&CK Matrix中表现为战术列中的每个框中,指攻击者使用的攻击技术;流程(Procedures)显示在技术页面中,指攻击者执行某种技术的具体过程。利用战术确定攻击类名称,包括初始访问类、执行类、持久化类、提权类、绕过类、发现类、横向移动类、收集类、控制和命令类、抑制响应功能类、损害过程控制类和影响类,为每个攻击类都添加战术描述属性用于描述战术,然后将技术添加至每个攻击类中作为函数功能,流程作为技术函数的返回值,对应关系如图8所示。同时在技术页面的Description中提取对象和操作,同技术与战术一起保存在数据库中,其中,对象指技术所针对的对象,例如操作系统,操作指漏洞利用可能采取的方式,例如篡改。Attack objects are represented by tactics, techniques, and procedures in the ATT&CK Matrix. Tactical (Tatic) is expressed as the column name of the matrix in ATT&CKMatrix, which refers to the purpose of the attacker using the technology; Technology (Technology) is expressed in each box in the tactical column in the ATT&CK Matrix, which refers to the attack technology used by the attacker; the process ( Procedures) are displayed on the technology page, which refers to the specific process by which the attacker executes a certain technology. Use tactics to determine attack class names, including initial access class, execution class, persistence class, privilege escalation class, bypass class, discovery class, lateral movement class, collection class, control and command class, suppression response function class, damage process control Classes and impact classes, add tactics description attributes to each attack class to describe the tactics, and then add technology to each attack class as a function function, and the process is the return value of the technology function. The corresponding relationship is shown in Figure 8. At the same time, the object and operation are extracted from the Description of the technology page, and stored in the database together with the technology and tactics. The object refers to the object targeted by the technology, such as the operating system, and the operation refers to the possible method of exploiting the vulnerability, such as tampering.
依据工控资产与技术的应用关系,为资产类和攻击类添加关联关系,资产类可应用攻击类中的方法,部分类示意图如图9所示。According to the application relationship between industrial control assets and technology, add the association relationship between the asset class and the attack class, and the asset class can apply the methods in the attack class. The schematic diagram of some classes is shown in Figure 9.
从系统漏洞角度来看,设备存在一个或多个漏洞,漏洞可由一种或多种攻击模式利用,对系统产生一种或多种影响;从攻击角度来看,攻击者对目标资产使用一种或多种攻击技术,实现一种或多种恶意目的;漏洞产生的影响和攻击者目的存在对应关系,攻击技术和攻击模式也存在对应关系,如图10所示。关于攻击模式和技术,CAPEC中112个攻击模式与ATT&CK的技术能够直接对应,在数据库中存储这些直接对应关系。From the perspective of system vulnerabilities, there are one or more vulnerabilities in the device, which can be exploited by one or more attack modes, and have one or more effects on the system; from the perspective of attacks, the attacker uses a There is a corresponding relationship between the impact of the vulnerability and the attacker's purpose, and there is also a corresponding relationship between the attack technology and the attack mode, as shown in Figure 10. Regarding the attack modes and technologies, the 112 attack modes in CAPEC can directly correspond to the technologies of ATT&CK, and these direct correspondences are stored in the database.
为实现漏洞和攻击的映射,在资产类中添加exploit方法,获取漏洞对应的攻击信息。exploit方法以漏洞信息中的漏洞产品、漏洞类型、攻击模式、攻击后果为输入,首先根据攻击模式查询数据库中是否存在对应的技术,若存在则返回该技术函数;若不存在,则将漏洞类型、攻击后果分别作为操作、技术或战术字段查询数据库表,得到对应的技术名并返回对应的技术函数,最后通过技术函数的返回值得到流程信息。In order to realize the mapping between vulnerabilities and attacks, the exploit method is added to the asset class to obtain the attack information corresponding to the vulnerabilities. The exploit method takes the vulnerability product, vulnerability type, attack mode, and attack consequence in the vulnerability information as input, first checks whether there is a corresponding technology in the database according to the attack mode, and returns the technology function if it exists; if not, returns the vulnerability type Query the database table with attack consequences and attack consequences respectively as the operation, technology or tactics fields, get the corresponding technology name and return the corresponding technology function, and finally get the process information through the return value of the technology function.
在AND/OR攻击图中添加攻击节点以展示多步攻击信息,攻击信息由四元组表示ATT=(攻击编号,战术,技术,流程),其中攻击编号从1开始每次增加1,用于唯一标识攻击节点信息。此外,添加exploit边,表示可以使用攻击节点对漏洞节点进行利用。遍历AND/OR攻击图中的设备节点及其漏洞节点,根据设备节点的设备类型找到对应的资产类,对设备节点的每个漏洞,利用资产类的exploit方法,通过漏洞信息获取攻击信息,若相同的攻击信息已存在于攻击图中,则直接在该攻击节点和漏洞节点间添加exploit有向边,若不存在,则添加包含该攻击信息的攻击节点,并在攻击信息表中添加一条记录。利用该方法生成攻击图,其中一条攻击路径的示意图如图11所示,图11中以攻击编号表示攻击节点,攻击信息表如表4所示。Add attack nodes in the AND/OR attack graph to display multi-step attack information, and the attack information is represented by a quaternion ATT=(attack number, tactics, technology, process), where the attack number increases by 1 each time starting from 1, for Uniquely identifies the attack node information. In addition, the exploit side is added, indicating that the attack node can be used to exploit the vulnerability node. Traverse the device nodes and their vulnerability nodes in the AND/OR attack graph, find the corresponding asset class according to the device type of the device node, and use the exploit method of the asset class to obtain attack information through the vulnerability information for each vulnerability of the device node. If the same attack information already exists in the attack graph, directly add an exploit directed edge between the attack node and the vulnerability node, if not, add the attack node containing the attack information, and add a record in the attack information table . This method is used to generate an attack graph. The schematic diagram of one of the attack paths is shown in Figure 11. In Figure 11, the attack node is represented by the attack number, and the attack information table is shown in Table 4.
表4攻击信息表Table 4 Attack Information Table
请参阅图12,为本申请一实施例提供的一种面向工业控制系统的多步攻击建模系统的结构示意图,为了便于说明,仅示出了与本实施例相关的部分,详述如下:Please refer to FIG. 12 , which is a schematic structural diagram of a multi-step attack modeling system oriented to an industrial control system provided by an embodiment of the present application. For the convenience of description, only the parts related to this embodiment are shown, and the details are as follows:
本申请的第二方面提供了一种面向工业控制系统的多步攻击建模系统,包括攻击图生成模块100、与或图构建模块200、与或攻击图生成模块300及扩展模块400。The second aspect of the present application provides a multi-step attack modeling system for industrial control systems, including an attack graph generation module 100 , an AND-OR graph construction module 200 , an AND-OR attack graph generation module 300 and an extension module 400 .
攻击图生成模块:用于进行系统拓扑分析和系统漏洞处理以生成攻击图;Attack graph generation module: used for system topology analysis and system vulnerability processing to generate attack graphs;
与或图构建模块:用于根据各物理组件设备的功能依赖关系构建与或图;AND-OR graph building block: used to build AND-OR graphs according to the functional dependencies of each physical component device;
与或攻击图生成模块:用于根据所述攻击图和所述与或图生成与或攻击图;And or attack graph generating module: used for generating an AND or attack graph according to the attack graph and the AND or graph;
扩展模块:用于对所述与或攻击图进行扩展。Extension module: used to extend the AND or attack graph.
需要说明的是,本实施例中的一种面向工业控制系统的多步攻击建模系统,是上述一种面向工业控制系统的多步攻击建模方法对应的建模系统的实施例,因此关于流量选路系统的各模块中软件方法的具体实现,可参照图1-图11的实施例,此处不再详细赘述。It should be noted that the multi-step attack modeling system oriented to industrial control systems in this embodiment is an embodiment of the modeling system corresponding to the above-mentioned multi-step attack modeling method oriented to industrial control systems, so the For the specific implementation of the software method in each module of the traffic routing system, reference may be made to the embodiments in FIGS. 1-11 , and details will not be repeated here.
本发明利用漏洞信息结合联网设备攻击图和非联网设备与或图,构成覆盖工控系统整体设备的与或攻击图;使用面向对象语言对ATT&CK Matri知识库进行描述,为与或攻击图添加攻击战术、技术和流程信息以描述多步攻击信息,使得安全分析人员能够从全局掌握工控系统安全状况;通过对攻击知识实现面向对象的语言描述,可扩展与泛化;可针对工控系统联网设备和非联网设备生成多步攻击图;可从较具体的漏洞层面和较抽象的战术、技术和流程层面展示攻击图。The present invention combines the networked equipment attack graph and the non-networked device AND or graph by using the vulnerability information to form an AND or attack graph covering the overall equipment of the industrial control system; using an object-oriented language to describe the ATT&CK Matri knowledge base, and adding attack tactics to the AND or attack graph , technical and process information to describe multi-step attack information, so that security analysts can grasp the security status of the industrial control system from a global perspective; through object-oriented language description of attack knowledge, it can be extended and generalized; it can target industrial control system networking equipment and non- Networked devices generate a multi-step attack graph; attack graphs can be presented at a more specific vulnerability level and at a more abstract tactical, technical, and process level.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those skilled in the art can appreciate that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。The above-described embodiments are only used to illustrate the technical solutions of the present application, rather than to limit them; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: it can still implement the foregoing embodiments Modifications to the technical solutions described in the examples, or equivalent replacements for some of the technical features; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the various embodiments of the application, and should be included in the Within the protection scope of this application.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210438285.1A CN115037508B (en) | 2022-04-25 | 2022-04-25 | A multi-step attack modeling method and system for industrial control systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210438285.1A CN115037508B (en) | 2022-04-25 | 2022-04-25 | A multi-step attack modeling method and system for industrial control systems |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115037508A CN115037508A (en) | 2022-09-09 |
CN115037508B true CN115037508B (en) | 2023-08-22 |
Family
ID=83120021
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210438285.1A Active CN115037508B (en) | 2022-04-25 | 2022-04-25 | A multi-step attack modeling method and system for industrial control systems |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115037508B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115801400A (en) * | 2022-11-14 | 2023-03-14 | 北京天融信网络安全技术有限公司 | Automatic permeation method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106709613A (en) * | 2015-07-16 | 2017-05-24 | 中国科学院信息工程研究所 | Risk assessment method suitable for industrial control system |
CN107566369A (en) * | 2017-09-05 | 2018-01-09 | 中国南方电网有限责任公司超高压输电公司 | A kind of industry control information system information security isolation and defence efficiency evaluation method |
CN108810034A (en) * | 2018-08-20 | 2018-11-13 | 杭州安恒信息技术股份有限公司 | A kind of safety protecting method of industrial control system information assets |
CN111193728A (en) * | 2019-12-23 | 2020-05-22 | 成都烽创科技有限公司 | Network security evaluation method, device, equipment and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8392997B2 (en) * | 2007-03-12 | 2013-03-05 | University Of Southern California | Value-adaptive security threat modeling and vulnerability ranking |
US11281806B2 (en) * | 2018-12-03 | 2022-03-22 | Accenture Global Solutions Limited | Generating attack graphs in agile security platforms |
US20210105293A1 (en) * | 2019-10-07 | 2021-04-08 | Booz Allen Hamilton Inc. | Methods and systems for anomaly detection in a networked control system |
-
2022
- 2022-04-25 CN CN202210438285.1A patent/CN115037508B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106709613A (en) * | 2015-07-16 | 2017-05-24 | 中国科学院信息工程研究所 | Risk assessment method suitable for industrial control system |
CN107566369A (en) * | 2017-09-05 | 2018-01-09 | 中国南方电网有限责任公司超高压输电公司 | A kind of industry control information system information security isolation and defence efficiency evaluation method |
CN108810034A (en) * | 2018-08-20 | 2018-11-13 | 杭州安恒信息技术股份有限公司 | A kind of safety protecting method of industrial control system information assets |
CN111193728A (en) * | 2019-12-23 | 2020-05-22 | 成都烽创科技有限公司 | Network security evaluation method, device, equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
《Attack Graph Generation and Visualization for Industrial Control Network》;Zibo Wang etal;《2020 39th Chinese Control Conference (CCC)》;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN115037508A (en) | 2022-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Eckhart et al. | Towards security-aware virtual environments for digital twins | |
Abraham et al. | Cyber security analytics: a stochastic model for security quantification using absorbing markov chains | |
Kotenko et al. | Attack modeling and security evaluation in SIEM systems | |
CN105871882A (en) | Network-security-risk analysis method based on network node vulnerability and attack information | |
CN107817756A (en) | Networking DNC system target range design method | |
CN113119124A (en) | Safety protection system of robot control system | |
Karray et al. | Attack tree construction and its application to the connected vehicle | |
CN115037508B (en) | A multi-step attack modeling method and system for industrial control systems | |
Nivethan et al. | Dynamic rule generation for SCADA intrusion detection | |
CN111193640B (en) | A Stateful Data Plane Fault Detection Method Using Policy Decomposition and Symbolic Execution | |
Murillo et al. | High-fidelity cyber and physical simulation of water distribution systems. II: Enabling cyber-physical attack localization | |
CN111698110B (en) | Network equipment performance analysis method, system, equipment and computer medium | |
Ovaz Akpinar et al. | Development of the ECAT preprocessor with the trust communication approach | |
Ján et al. | Intrusion detection system behavior as resource-oriented formula | |
Wolf et al. | Adaptive modelling for security analysis of networked control systems | |
Schneider et al. | Realistic data generation for anomaly detection in industrial settings using simulations | |
Wan et al. | Content-based deep communication control for networked control system | |
CN115484326A (en) | Method, system and storage medium for processing data | |
Fauri et al. | Role inference+ anomaly detection= situational awareness in BACnet networks | |
Rothmaier et al. | Using Spin and Eclipse for optimized high-level modeling and analysis of computer network attack models | |
Almalawi et al. | SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention | |
Warner | Automatic configuration of programmable logic controller emulators | |
Lois et al. | Designing Secure and Resilient Cyber-Physical Systems Using Formal Models | |
Nguyen | Automated attack tree generation and evaluation: systemization of knowledge | |
Wang et al. | Graph Pre-training for Reconnaissance Perception in Automated Penetration Testing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |