• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于 W-HMM 方法的工业控制系统安全三阶段动态评估框架

A Three-Stage Dynamic Assessment Framework for Industrial Control System Security Based on a Method of W-HMM.

机构信息

School of Mechanical Engineering and Automation, Beihang University, Beijing 100191, China.

出版信息

Sensors (Basel). 2022 Mar 28;22(7):2593. doi: 10.3390/s22072593.

DOI:10.3390/s22072593
PMID:35408212
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9002662/
Abstract

Industrial control systems (ICS) are applied in many fields. Due to the development of cloud computing, artificial intelligence, and big data analysis inducing more cyberattacks, ICS always suffers from the risks. If the risks occur during system operations, corporate capital is endangered. It is crucial to assess the security of ICS dynamically. This paper proposes a dynamic assessment framework for industrial control system security (DAF-ICSS) based on machine learning and takes an industrial robot system as an example. The framework conducts security assessment from qualitative and quantitative perspectives, combining three assessment phases: static identification, dynamic monitoring, and security assessment. During the evaluation, we propose a weighted Hidden Markov Model (W-HMM) to dynamically establish the system's security model with the algorithm of Baum-Welch. To verify the effectiveness of DAF-ICSS, we have compared it with two assessment methods to assess industrial robot security. The comparison result shows that the proposed DAF-ICSS can provide a more accurate assessment. The assessment reflects the system's security state in a timely and intuitive manner. In addition, it can be used to analyze the security impact caused by the unknown types of ICS attacks since it infers the security state based on the explicit state of the system.

摘要

工业控制系统(ICS)应用于许多领域。由于云计算、人工智能和大数据分析的发展导致更多的网络攻击,ICS 始终面临风险。如果在系统运行过程中发生风险,企业资本将面临危险。动态评估 ICS 的安全性至关重要。本文提出了一种基于机器学习的工业控制系统安全动态评估框架(DAF-ICSS),并以工业机器人系统为例。该框架从定性和定量两个角度进行安全评估,结合三个评估阶段:静态识别、动态监控和安全评估。在评估过程中,我们提出了一种加权隐马尔可夫模型(W-HMM),并使用 Baum-Welch 算法动态建立系统的安全模型。为了验证 DAF-ICSS 的有效性,我们将其与两种评估方法进行了比较,以评估工业机器人的安全性。比较结果表明,所提出的 DAF-ICSS 可以提供更准确的评估。该评估及时直观地反映了系统的安全状态。此外,由于它根据系统的明确状态推断安全状态,因此可以用于分析未知类型的 ICS 攻击造成的安全影响。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/d3937f9aec45/sensors-22-02593-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/aa1f25ccf662/sensors-22-02593-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/21d181741ed3/sensors-22-02593-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/d4ed3b6f1024/sensors-22-02593-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/19c15e75764e/sensors-22-02593-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/fec1f13b3267/sensors-22-02593-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/1375f4160afc/sensors-22-02593-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/b319a1a70f1e/sensors-22-02593-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/5e24b114ffb5/sensors-22-02593-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/d3937f9aec45/sensors-22-02593-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/aa1f25ccf662/sensors-22-02593-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/21d181741ed3/sensors-22-02593-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/d4ed3b6f1024/sensors-22-02593-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/19c15e75764e/sensors-22-02593-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/fec1f13b3267/sensors-22-02593-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/1375f4160afc/sensors-22-02593-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/b319a1a70f1e/sensors-22-02593-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/5e24b114ffb5/sensors-22-02593-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3cfa/9002662/d3937f9aec45/sensors-22-02593-g009.jpg

相似文献

1
A Three-Stage Dynamic Assessment Framework for Industrial Control System Security Based on a Method of W-HMM.基于 W-HMM 方法的工业控制系统安全三阶段动态评估框架
Sensors (Basel). 2022 Mar 28;22(7):2593. doi: 10.3390/s22072593.
2
The risk assessment on the security of industrial internet infrastructure under intelligent convergence with the case of G.E.'s intellectual transformation.智能融合背景下工业互联网基础设施安全风险评估——以通用电气的智能化转型为例。
Math Biosci Eng. 2022 Jan 14;19(3):2896-2912. doi: 10.3934/mbe.2022133.
3
A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques.云计算中使用混合机器学习技术的联合资源分配、安全与高效任务调度。
Sensors (Basel). 2022 Feb 6;22(3):1242. doi: 10.3390/s22031242.
4
Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies.保障工业控制系统安全:组件、网络威胁及机器学习驱动的防御策略
Sensors (Basel). 2023 Oct 30;23(21):8840. doi: 10.3390/s23218840.
5
The Construction of Big Data Computational Intelligence System for E-Government in Cloud Computing Environment and Its Development Impact.云计算环境下电子政务大数据计算智能系统构建及其发展影响。
Comput Intell Neurosci. 2022 Mar 24;2022:7295060. doi: 10.1155/2022/7295060. eCollection 2022.
6
Research on Medical Security System Based on Zero Trust.基于零信任的医疗保障体系研究。
Sensors (Basel). 2023 Apr 6;23(7):3774. doi: 10.3390/s23073774.
7
Implementing EM and Viterbi algorithms for Hidden Markov Model in linear memory.在线性内存中实现隐马尔可夫模型的期望最大化(EM)算法和维特比(Viterbi)算法。
BMC Bioinformatics. 2008 Apr 30;9:224. doi: 10.1186/1471-2105-9-224.
8
Network Security Prediction of Industrial Control Based on Projection Equalization Optimization Algorithm.基于投影均衡优化算法的工业控制网络安全预测
Sensors (Basel). 2024 Jul 20;24(14):4716. doi: 10.3390/s24144716.
9
The application of Baum-Welch algorithm in multistep attack.鲍姆-韦尔奇算法在多步攻击中的应用。
ScientificWorldJournal. 2014;2014:374260. doi: 10.1155/2014/374260. Epub 2014 May 28.
10
A health informatics transformation model based on intelligent cloud computing - exemplified by type 2 diabetes mellitus with related cardiovascular diseases.基于智能云计算的健康信息学转化模型——以 2 型糖尿病及其相关心血管疾病为例。
Comput Methods Programs Biomed. 2020 Jul;191:105409. doi: 10.1016/j.cmpb.2020.105409. Epub 2020 Feb 25.

本文引用的文献

1
An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks.一种用于检测无线传感器网络中干扰攻击的边缘节点匿名信道分类方案。
Sensors (Basel). 2020 Apr 18;20(8):2311. doi: 10.3390/s20082311.
2
Information security climate and the assessment of information security risk among healthcare employees.医疗保健员工的信息安全氛围和信息安全风险评估。
Health Informatics J. 2020 Mar;26(1):461-473. doi: 10.1177/1460458219832048. Epub 2019 Mar 14.