应用科学学报 ›› 2023, Vol. 41 ›› Issue (5): 855-869.doi: 10.3969/j.issn.0255-8297.2023.05.011

• 计算机科学与应用 • 上一篇    

融合工业控制操作的攻击建模

张耀方1,3, 张哲宇2, 李彤彤1,3, 孙军2, 王子博1,3, 王佰玲1,3   

  1. 1. 哈尔滨工业大学(威海) 计算机科学与技术学院, 山东 威海 264200;
    2. 国家工业信息安全发展研究中心, 北京 100040;
    3. 哈尔滨工业大学 网络空间安全研究院, 黑龙江 哈尔滨 150001
  • 收稿日期:2021-08-16 发布日期:2023-09-28
  • 通信作者: 王佰玲,教授,博导,研究方向为信息内容安全、信息对抗、工业互联网安全等。E-mail:wbl@hit.edu.cn E-mail:wbl@hit.edu.cn
  • 基金资助:
    国防基础科研计划(No.JCKY2019608B001)资助

Attack Modeling Combined with Industrial Control Operati

ZHANG Yaofang1,3, ZHANG Zheyu2, LI Tongtong1,3, SUN Jun2, WANG Zibo1,3, WANG Bailing1,3   

  1. 1. School of Computer Science and Technology, Harbin Institute of Technology (Weihai), Weihai 264200, Shandong, China;
    2. China Industrial Control Systems Cyber Emergency Response Team, Beijing 100040, China;
    3. School of Cyberspace Science, Harbin Institute of Technology, Harbin 150001, Heilongjiang, China
  • Received:2021-08-16 Published:2023-09-28

摘要: 现有工业环境攻击图缺少协议漏洞、攻击语义和控制操作的关联展示,导致智能制造系统攻击图的表述存在缺失,且系统流程操作对底层设备影响无法在图中进行描述。为此,该文对攻击图语义和攻击图模型进行研究,提出了工业环境下专有协议和特定攻击的攻击图关联规则,基于搜索算法生成扩展语义的智能制造系统攻击图。同时,设计了包含漏洞层、主机层、操作层的三层攻击图模型,利用操作与主机的映射关系将智能制造系统业务操作融入到攻击图中进行关联展示。实验结果表明,所提的扩展规则和模型可以较好地丰富和描述智能制造系统的多步攻击过程。

关键词: 工业控制, 智能制造系统, 攻击图, 语义扩展, 业务操作

Abstract: Existing industrial environment attack graph lacks the association display of protocol vulnerabilities, attack semantics and control operations, resulting in missing representations of the intelligent manufacturing system attack graph. The impact of system process operations on the underlying equipment cannot be described in the graph. Therefore, this paper proposes the attack graph association rules for proprietary protocols and specific attacks in industrial environments. Attack graphs for intelligent manufacturing systems with extended semantics are generated based on search algorithms. Furthermore, a three-layer attack graph model incorporating vulnerability, host, and operation layers is designed to integrate business operations into the attack graph for correlated display. Experimental results show that the extended rules and model can effectively enrich and describe the multi-step attack process of the intelligent manufacturing system.

Key words: industrial control, intelligent manufacturing system, attack graph, semantic extension, business operation

中图分类号: