• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

社交集体攻击模型与大规模信息-物理系统的应对规程。

Social Collective Attack Model and Procedures for Large-Scale Cyber-Physical Systems.

机构信息

Department of Electronic Information and Electrical Engineering, Changsha University, Changsha 410022, China.

College of Computer, National University of Defense Technology, Changsha 410073, China.

出版信息

Sensors (Basel). 2021 Feb 2;21(3):991. doi: 10.3390/s21030991.

DOI:10.3390/s21030991
PMID:33540605
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7867278/
Abstract

A large-scale Cyber-Physical System (CPS) such as a smart grid usually provides service to a vast number of users as a public utility. Security is one of the most vital aspects in such critical infrastructures. The existing CPS security usually considers the attack from the information domain to the physical domain, such as injecting false data to damage sensing. Social Collective Attack on CPS (SCAC) is proposed as a new kind of attack that intrudes into the social domain and manipulates the collective behavior of social users to disrupt the physical subsystem. To provide a systematic description framework for such threats, we extend MITRE ATT&CK, the most used cyber adversary behavior modeling framework, to cover social, cyber, and physical domains. We discuss how the disinformation may be constructed and eventually leads to physical system malfunction through the social-cyber-physical interfaces, and we analyze how the adversaries launch disinformation attacks to better manipulate collective behavior. Finally, simulation analysis of SCAC in a smart grid is provided to demonstrate the possibility of such an attack.

摘要

大规模的信息物理系统(CPS),如智能电网,通常作为公共设施为大量用户提供服务。安全是这些关键基础设施中最重要的方面之一。现有的 CPS 安全通常考虑从信息域到物理域的攻击,例如注入虚假数据以破坏传感。社会集体攻击信息物理系统(SCAC)被提出作为一种新的攻击方式,它会侵入社会领域并操纵社会用户的集体行为来扰乱物理子系统。为了为这些威胁提供一个系统的描述框架,我们扩展了 MITRE ATT&CK,这是最常用的网络对手行为建模框架,以涵盖社会、网络和物理领域。我们讨论了虚假信息是如何构建的,并最终通过社会-网络-物理接口导致物理系统故障,我们还分析了对手如何发起虚假信息攻击以更好地操纵集体行为。最后,提供了智能电网中 SCAC 的仿真分析,以演示这种攻击的可能性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/db2573033ffe/sensors-21-00991-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/0ff632fed775/sensors-21-00991-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/a08ad04ef210/sensors-21-00991-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/0d13b213ce73/sensors-21-00991-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/eb3d504f914b/sensors-21-00991-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/ceee772871f4/sensors-21-00991-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/f6879bc92666/sensors-21-00991-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/42ad860666b2/sensors-21-00991-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/4d84a291a1ce/sensors-21-00991-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/2193f3fd3b4d/sensors-21-00991-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/fe4c6b031982/sensors-21-00991-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/abe1181e355e/sensors-21-00991-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/c12d2f654c4e/sensors-21-00991-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/d4c61cf7884b/sensors-21-00991-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/1cb436651b68/sensors-21-00991-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/7b739628879b/sensors-21-00991-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/db2573033ffe/sensors-21-00991-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/0ff632fed775/sensors-21-00991-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/a08ad04ef210/sensors-21-00991-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/0d13b213ce73/sensors-21-00991-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/eb3d504f914b/sensors-21-00991-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/ceee772871f4/sensors-21-00991-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/f6879bc92666/sensors-21-00991-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/42ad860666b2/sensors-21-00991-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/4d84a291a1ce/sensors-21-00991-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/2193f3fd3b4d/sensors-21-00991-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/fe4c6b031982/sensors-21-00991-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/abe1181e355e/sensors-21-00991-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/c12d2f654c4e/sensors-21-00991-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/d4c61cf7884b/sensors-21-00991-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/1cb436651b68/sensors-21-00991-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/7b739628879b/sensors-21-00991-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9861/7867278/db2573033ffe/sensors-21-00991-g016.jpg

相似文献

1
Social Collective Attack Model and Procedures for Large-Scale Cyber-Physical Systems.社交集体攻击模型与大规模信息-物理系统的应对规程。
Sensors (Basel). 2021 Feb 2;21(3):991. doi: 10.3390/s21030991.
2
Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework.使用网络安全文化框架评估MITRE ATT&CK风险
Sensors (Basel). 2021 May 9;21(9):3267. doi: 10.3390/s21093267.
3
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.智能电网环境中广域监测、保护和控制的网络-物理安全。
J Adv Res. 2014 Jul;5(4):481-9. doi: 10.1016/j.jare.2013.12.005. Epub 2013 Dec 27.
4
Cyber-physical systems security: Limitations, issues and future trends.网络物理系统安全:局限性、问题与未来趋势。
Microprocess Microsyst. 2020 Sep;77:103201. doi: 10.1016/j.micpro.2020.103201. Epub 2020 Jul 8.
5
GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids.电网攻击分析器:智能电网的网络攻击分析框架。
Sensors (Basel). 2022 Jun 24;22(13):4795. doi: 10.3390/s22134795.
6
Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways.基于 IEC 61850 的变电站自动化系统的拒绝服务攻击:智能变电站路径的关键网络威胁
Sensors (Basel). 2021 Sep 26;21(19):6415. doi: 10.3390/s21196415.
7
Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.对抗性风险分析,为保护网络物理系统免受网络攻击分配最优防御资源。
Risk Anal. 2019 Dec;39(12):2766-2785. doi: 10.1111/risa.13382. Epub 2019 Jul 30.
8
Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems.基于规则的电力系统最优潮流虚假数据注入攻击检测
Sensors (Basel). 2021 Apr 2;21(7):2478. doi: 10.3390/s21072478.
9
Security Control of Cyber-Physical Systems under Cyber Attacks: A Survey.网络攻击下信息物理系统的安全控制:综述
Sensors (Basel). 2024 Jun 13;24(12):3815. doi: 10.3390/s24123815.
10
An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks.一种用于确保6G自动驾驶汽车网络中安全通信的智能动态信息物理系统威胁检测系统。
Sci Rep. 2024 Sep 5;14(1):20795. doi: 10.1038/s41598-024-70835-3.