2.845

2023影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于多目标决策的工控系统设备安全评估方法研究

贾驰千 冯冬芹

贾驰千, 冯冬芹. 基于多目标决策的工控系统设备安全评估方法研究. 自动化学报, 2016, 42(5): 706-714. doi: 10.16383/j.aas.2016.c150546
引用本文: 贾驰千, 冯冬芹. 基于多目标决策的工控系统设备安全评估方法研究. 自动化学报, 2016, 42(5): 706-714. doi: 10.16383/j.aas.2016.c150546
JIA Chi-Qian, FENG Dong-Qin. Industrial Control System Devices Security Assessment with Multi-objective Decision. ACTA AUTOMATICA SINICA, 2016, 42(5): 706-714. doi: 10.16383/j.aas.2016.c150546
Citation: JIA Chi-Qian, FENG Dong-Qin. Industrial Control System Devices Security Assessment with Multi-objective Decision. ACTA AUTOMATICA SINICA, 2016, 42(5): 706-714. doi: 10.16383/j.aas.2016.c150546

基于多目标决策的工控系统设备安全评估方法研究

doi: 10.16383/j.aas.2016.c150546
基金项目: 

工控网络安全研究 2015XZZX005-03

国家自然科学基金 61223004

详细信息
    作者简介:

    贾驰千 浙江大学智能系统与控制研究所硕士研究生. 2014 年获得浙江大学控制学院工学学士学位. 主要研究方向为工业控制系统安全. E-mail: cqjay2010@163.com.

    通讯作者:

    冯冬芹 浙江大学工业控制技术国家重点实验室、浙江大学智能系统与控制研究所教授. 主要研究方向为现场总线, 实时以太网, 工业无线通信技术, 工业控制系统安全以及网络控制系统的研发与标准化工作. 本文通信作者. Email: dqfeng@iipc.zju.edu.cn.

Industrial Control System Devices Security Assessment with Multi-objective Decision

Funds: 

Research on the Security of Industrial Control Network 2015XZZX005-03

National Natural Science Foundation of China 61223004

More Information
    Author Bio:

    Master student at the Institute of CyberSystems and Control, Zhejiang University. He received his bachelor degree from Zhejiang University in 2014. His research interest covers security of industrial control system. E-mail:.

    Corresponding author: FENG DongQin Professor at the State Key Laboratory of Industrial Control Technology, In stitute of CyberSystems and Control, Zhejiang University. His research interest coverseld bus, realtime ethernet, in dustrial wireless communication technology, security of in dustrial control system, and network control system. Cor responding author of this paper.E-mail:dqfeng@iipc.zju.edu.cn.
  • 摘要: 目前的工业控制系统(Industrial control systems, ICS) 安全评估方法中,往往利用专家经验对系统设备受攻击的可能性进行赋值, 主观性较强.针对这个问题,本文提出了一种系统设备受攻击可能性的量化计算方法. 工控系统设备受攻击的可能性与两个因素有关,该设备受攻击后, 造成系统损害的严重程度与异常检测算法发现异常的时间长短.因此, 通过对工控系统中的各个设备发动相同攻击,记录各个设备受攻击后系统敏感指标的变化情况与异常检测算法发现异常的时间, 将敏感指标变化情况与发现异常时间作为量化指标,提出基于多目标决策的量化计算方法, 计算出各个设备受攻击的可能性.本文以田纳西--伊斯曼过程(Tennessee-Eastman process, TEP)为例,验证了计算方法的可行性,得到了设备受攻击可能性的量化计算结果.
  • 图  1  反应炉控制系统

    Fig.  1  Reactor control system

    图  2  TE过程工艺流程图

    Fig.  2  Reactor control system

    图  3  受攻击后反应炉压力温度变化

    Fig.  3  Pressure and temperature condition of reactor

    图  4  SPE和T2统计值 TE过程工艺流程图

    Fig.  4  SPE and T2 statistical value

    表  1  量化评判表

    Table  1  Quantitative evaluation table

    设备工艺指标1工艺指标2 T2异常检测时间SPE异常检测时间
    x1x11x12x13x14
    x2x21x22x23x24
    xmxm1xm2xm3xm4
    下载: 导出CSV

    表  2  过程操作限制

    Table  2  Process operating constraints

    过程变量正常操作限制停机操作限制
    下限上限下限上限
    反应炉压力(kPa)2 8953 000
    反应炉液位(m3)50% (11.8)100% (21.3)2.0(24.0)
    反应炉温度(℃)150175
    分离器液位(m3)30% (3.3)100% (9.0)11.812.0
    汽提塔基准液位(m3)30% (3.5)100% (6.6)1.08.0
    下载: 导出CSV

    表  3  实验结果

    Table  3  Experiment results

    设备反应炉反应炉检测时间 检测时间
    压力(kPa)温度(℃)T2异常 SPE异常
    A13 0001221 4001 400
    A23 000122-1 200
    a33 000122-1 000
    a43 0001221 4501 380
    A53 050140720760
    a62 800139850870
    下载: 导出CSV
  • [1] Illiashenko O, Kharchenko V, Ahtyamov M. Security assessment and green issues of FPGA-based information and control systems. In: Proceedings of the 2013 International Conference on Digital Technologies (DT). Zilina, Slovakia: IEEE, 2013. 185-190
    [2] Papakonstantinou N, Sierla S, Charitoudi K, O'Halloran B, Karhela T, Vyatkin V, Turner I. Security impact assessment of industrial automation systems using genetic algorithm and simulation. In: Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA). Barcelona, Spain: IEEE, 2014. 1-8
    [3] Lu Hui-Kang, Chen Dong-Qing, Peng Yong, Wang Hua-Zhong. Quantitative research on risk assessment for information security of industrial control system. Process Automation Instrumentation, 2014,35(10): 21-25
    [4] Wang L J, Wang B, Peng Y J. Research the information security risk assessment technique based on Bayesian network. In: Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE). Chengdu, China: IEEE, 2010. V3-600-V3-604
    [5] Bian N Y, Wang X Y, Mao L. Network security situational assessment model based on improved AHP_FCE. In: Proceedings of the 6th International Conference on Advanced Computational Intelligence (ICACI). Hangzhou, China: IEEE, 2013. 200-205
    [6] 卢慧康, 陈冬青, 彭勇, 王华忠. 工业控制系统信息安全风险评估量化研究. 自动化仪表, 2014, 35(10): 21-25

    Lu Hui-Kang, Chen Dong-Qing, Peng Yong, Wang Hua-Zhong. Quantitative research on risk assessment for information security of industrial control system. Process Automation Instrumentation, 2014,35(10): 21-25
    [7] Sasirekha V, Ilanzkumaran M. Heterogeneous wireless network selection using FAHP integrated with TOPSIS and VIKOR. In: Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME). Salem, India: IEEE, 2013. 399-407
    [8] Mohyeddin M A, Gharaee H. FAHP-TOPSIS risks ranking models in ISMS. In: Proceedings of the 7th International Symposium on Telecommunications (IST). Tehran, Iran: IEEE, 2014. 879-882
    [9] Cárdenas A A, Amin S, Lin Z S, Huang Y L, Huang C Y, Sastry S. Attacks against process control systems: risk, assessment, detection, and response. In: Proceedings of the 6th ACM Symposium on Information. Computer and Communication Security. New York, USA: ACM Press, 2011. 355 -366
    [10] Nziga J P, Cannady J. Minimal dataset for network intrusion detection systems via MID-PCA: a hybrid approach. In: Proceedings of the 6th International Conference Intelligent Systems (IS). Sofia, Bulgaria: IEEE, 2012. 453-460
    [11] Livani M A, Abadi M. A PCA-based distributed approach for intrusion detection in wireless sensor networks. In: Proceedings of the 2011 International Symposium on Computer Networks and Distributed Systems (CNDS). Tehran, Iran: IEEE, 2011. 55-60
    [12] Downs J J, Vogel E F. A plant-wide industrial process control problem. Computers and Chemical Engineering, 1993,17(3): 245-255
    [13] Lyman P R, Georgakis C. Plant-wide control of the Tennessee Eastman problem. Computers and Chemical Engineering, 1995,19(3): 321-331
    [14] McAvoy T J. A methodology for screening level control structures in plantwide control systems. Computers and Chemical Engineering, 1998,22(11): 1543-1552
  • 加载中
图(4) / 表(3)
计量
  • 文章访问数:  2084
  • HTML全文浏览量:  218
  • PDF下载量:  1433
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-08-31
  • 录用日期:  2015-11-17
  • 刊出日期:  2016-05-01

目录

    /

    返回文章
    返回