Journal of Applied Sciences ›› 2023, Vol. 41 ›› Issue (5): 855-869.doi: 10.3969/j.issn.0255-8297.2023.05.011

• Computer Science and Applications • Previous Articles    

Attack Modeling Combined with Industrial Control Operati

ZHANG Yaofang1,3, ZHANG Zheyu2, LI Tongtong1,3, SUN Jun2, WANG Zibo1,3, WANG Bailing1,3   

  1. 1. School of Computer Science and Technology, Harbin Institute of Technology (Weihai), Weihai 264200, Shandong, China;
    2. China Industrial Control Systems Cyber Emergency Response Team, Beijing 100040, China;
    3. School of Cyberspace Science, Harbin Institute of Technology, Harbin 150001, Heilongjiang, China
  • Received:2021-08-16 Published:2023-09-28

Abstract: Existing industrial environment attack graph lacks the association display of protocol vulnerabilities, attack semantics and control operations, resulting in missing representations of the intelligent manufacturing system attack graph. The impact of system process operations on the underlying equipment cannot be described in the graph. Therefore, this paper proposes the attack graph association rules for proprietary protocols and specific attacks in industrial environments. Attack graphs for intelligent manufacturing systems with extended semantics are generated based on search algorithms. Furthermore, a three-layer attack graph model incorporating vulnerability, host, and operation layers is designed to integrate business operations into the attack graph for correlated display. Experimental results show that the extended rules and model can effectively enrich and describe the multi-step attack process of the intelligent manufacturing system.

Key words: industrial control, intelligent manufacturing system, attack graph, semantic extension, business operation

CLC Number: