• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

ExtHT:一种用于电力工业控制系统中网络攻击的混合追踪方法。

ExtHT: A hybrid tracing method for cyber-attacks in power industrial control systems.

作者信息

Chen Yang-Rong, Wang Yu, Huang Gui-Rong, Li Jun-E

机构信息

Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China.

出版信息

ISA Trans. 2023 May;136:1-15. doi: 10.1016/j.isatra.2022.10.024. Epub 2022 Oct 29.

DOI:10.1016/j.isatra.2022.10.024
PMID:36357220
Abstract

Tracing the sources of cyber-attacks in Power Industrial Control Systems (PICS) can help the defense systems to block the attacks, and support the decision of the grid control policies. However, there has been no work on the cyber-attack source traceback for PICS, and the methods for the Internet are not suitable for PICS in terms of fineness, real-time performance, and supporting communication protocols. Therefore, a method for tracing cyber-attacks in PICS is proposed. First, the communication network architecture of PICS and the cyber security threats to PICS are analyzed. Then, an extended hybrid tracing method (ExtHT) based on packet marking and packet logging is proposed. This method involves all the devices working at the data link layer and upper layers to achieve more fine-grained attack tracing. At the same time, taking the costs of attack tracing into consideration, a coarse-grained tracing mode is presented to improve the tracing speed. In addition, a log database optimization scheme is provided to reduce storage costs. To facilitate the application of this method in practice, a cyber-attack source tracing system and its deployment architecture are designed for PICS. Further, the applicability and limitations of ExtHT are analyzed, theory ratiocinations are given to justify our ExtHT, and the performance of our ExtHT is compared with that of existing mainstream methods. Finally, two cyber-attack scenarios against PICS are constructed and the feasibility of ExtHT is verified on them.

摘要

追踪电力工业控制系统(PICS)中的网络攻击源有助于防御系统阻断攻击,并为电网控制策略的决策提供支持。然而,目前尚未有针对PICS网络攻击源回溯的相关工作,且互联网的方法在精细度、实时性能和支持的通信协议方面并不适用于PICS。因此,提出了一种用于追踪PICS中网络攻击的方法。首先,分析了PICS的通信网络架构以及PICS面临的网络安全威胁。然后,提出了一种基于数据包标记和数据包日志记录的扩展混合追踪方法(ExtHT)。该方法涉及所有工作在数据链路层及以上层的设备,以实现更细粒度的攻击追踪。同时,考虑到攻击追踪的成本,提出了一种粗粒度追踪模式以提高追踪速度。此外,还提供了一种日志数据库优化方案以降低存储成本。为便于该方法在实际中应用,为PICS设计了一个网络攻击源追踪系统及其部署架构。进一步分析了ExtHT的适用性和局限性,进行了理论推理以证明ExtHT的合理性,并将ExtHT的性能与现有主流方法进行了比较。最后,构建了两种针对PICS的网络攻击场景,并在其上验证了ExtHT的可行性。

相似文献

1
ExtHT: A hybrid tracing method for cyber-attacks in power industrial control systems.ExtHT:一种用于电力工业控制系统中网络攻击的混合追踪方法。
ISA Trans. 2023 May;136:1-15. doi: 10.1016/j.isatra.2022.10.024. Epub 2022 Oct 29.
2
Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.考虑合理性演化的针对网络攻击的保护资源分配优化的多阶段攻防图博弈分析
Risk Anal. 2022 May;42(5):1086-1105. doi: 10.1111/risa.13837. Epub 2021 Oct 11.
3
Hybrid single-packet IP traceback with low storage and high accuracy.具有低存储量和高精度的混合单包IP溯源
ScientificWorldJournal. 2014 Feb 23;2014:239280. doi: 10.1155/2014/239280. eCollection 2014.
4
A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.复杂网络安全控制的最新进展与方法综述。
Sensors (Basel). 2023 Apr 15;23(8):4013. doi: 10.3390/s23084013.
5
Storage-efficient 16-Bit Hybrid IP traceback with Single Packet.具有单数据包的存储高效16位混合IP回溯
ScientificWorldJournal. 2014;2014:659894. doi: 10.1155/2014/659894. Epub 2014 Oct 20.
6
Correlation-Based Anomaly Detection in Industrial Control Systems.基于相关的工业控制系统异常检测。
Sensors (Basel). 2023 Feb 1;23(3):1561. doi: 10.3390/s23031561.
7
Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning.基于机器学习的改进型无线医疗信息物理系统(IWMCPS)
Healthcare (Basel). 2023 Jan 29;11(3):384. doi: 10.3390/healthcare11030384.
8
Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.对抗性风险分析,为保护网络物理系统免受网络攻击分配最优防御资源。
Risk Anal. 2019 Dec;39(12):2766-2785. doi: 10.1111/risa.13382. Epub 2019 Jul 30.
9
CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks.CANon:用于汽车控制器局域网的轻量级实用网络攻击检测
Sensors (Basel). 2022 Mar 29;22(7):2636. doi: 10.3390/s22072636.
10
Leader-Following Secure Output Consensus of Heterogeneous Multiagent Systems Based on Two Sampling Mechanisms Under Hybrid Cyber-Attacks.基于两种采样机制的异构多智能体系统在混合网络攻击下的领导者-跟随者安全输出一致性
IEEE Trans Cybern. 2024 Dec;54(12):7826-7838. doi: 10.1109/TCYB.2024.3422232. Epub 2024 Nov 27.