首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
为研究网络空间,特别是核电系统的各种安全威胁和防护问题,对核工业网络安全仿真测试床的建设进行研究。采用分组分析法,从工控网络测试验证、安全研究与演练等角度对仿真测试床分组,并从安全仿真与建模技术研究、典型安全测试与评估靶标方面进行需求评判。该研究通过建设网络安全仿真测试床,构建出虚拟化、云计算等底层基础架构的组合,提供功能强大的虚拟机或物理机,并组建无限接近于真实网络环境的虚拟网络环境。研究核工业控制系统网络和系统本身的安全威胁、防护机制以及核工业系统基础设施的安全建设问题,为解决日益严峻的核工业安全形势提供参考。  相似文献   

2.
半实物仿真试验研究是水下热动力系统研究的重要手段之一.文中以某型水下热动力系统为对象,基于虚拟仪器技术设计了一种水下热动力系统半实物仿真试验系统.该系统将控制器、燃料泵等实物与计算机、信号测试设备等构成有机整体,形成半实物仿真系统.简要介绍了水下热动力系统原理,详细介绍了半实物仿真系统所采用的数学模型、测控原理及仿真软件设计.并进行了试验验证研究,试验结果表明该系统能够对燃料泵及其控制系统的动、静态特性进行全面的考核试验,系统可靠,使用方便,具有较强的实用性.  相似文献   

3.
飞机制动系统的半物理仿真研究是提高飞机总体设计极为重要和有效的环节之一.以Redhawk并行仿真计算机为硬件平台,将刹车控制单元和液压模拟系统作为实物模型,在先进的SimulationWorkbench(SWB)仿真环境下对飞机制动系统进行了半物理仿真研究.经仿真测试,该仿真系统设计合理、有效,能够满足飞机防滑制动系统性能的要求.该系统对构建高性能飞机防滑制动系统的研究具有工程实际意义.  相似文献   

4.
本文通过对SCADA系统结构的分析和与传统IT系统的对比,总结了当今SCADA系统在信息安全方面面临的主要风险,提出SCADA系统信息安全的分层防护理念,并且重点探讨了SCADA内部信息安全保护技术.  相似文献   

5.
宁伟  杜承烈 《测控技术》2006,25(8):76-78
针对实时半实物仿真系统对实时性要求高的特点,提出一种利用广播内存网技术构建实时半实物仿真系统的方法.详细地阐述了广播内存网的工作原理、技术特点和连接方式,设计了一套基于虚拟共享内存中间件技术的实时半实物仿真基础平台软件.以该基础平台软件为核心,对整个实时半实物仿真系统进行了详尽的功能及性能测试,测试结果表明该系统传输延迟及抖动小,传输可靠性高,可以满足实时半实物仿真系统对实时性和可靠性的要求.  相似文献   

6.
随着诸如监控和数据采集(SCADA)系统之类的工业控制系统越来越多地连接到企业网络和互联网,其安全性受到极大威胁。研究SCADA系统的异常检测问题时,考虑到了SCADA系统的通信流量通常是高度周期性的。针对SCADA系统提出一种基于输入输出(IO)地址分离和频谱分析的异常检测模型自动构建的方法。实验在真实的SCADA测试平台上进行,结果表明该方法性能优于其他建模方法。  相似文献   

7.
本文首次提出了一种新的网络物理隔离技术。该技术用于SCADA系统与管理信息系统(MIS)的网络隔离互联。经过抗攻击测试证明采用该技术的SCADA系统能有效防御各种网络攻击。该技术是SCADA系统信息安全的关键技术。  相似文献   

8.
刘浩  于劲松  张海杰  王辉  雷学军 《测控技术》2012,31(10):121-123
结合多普勒导航雷达工作原理,提出基于半实物仿真的多普勒导航雷达测试系统设计方案,重点对测试系统硬件结构、软件设计、基于回波模拟器的半实物仿真系统结构进行了讨论.该系统具有良好的通用性、灵活性、易扩展性,并且人机交互简单,经实际运行验证,该系统能对多普勒导航雷达进行全面、高精度、快速测试.  相似文献   

9.
飞行器的Muti-Agent测试床是研究多无人机协同算法的重要平台。首先基于HLA标准完成了测试床构架的总体设计,然后通过测试床软件体系结构设计、运行流程设计、接口设计3个方面完成了整个系统的详细设计,最后通过使用VC++作为开发工具,采用地形LOD、MAPX控件、飞行器系统建模等方法实现了针对飞行器的Muti-A-gent分布式三维仿真测试床。仿真实例表明,该系统具有较强的通用性和逼真性。  相似文献   

10.
数据采集与监视控制系统(Supervisory Control And Data Acquisition,SCADA)是工业控制系统的核心,但因SCADA系统中节点分布比较分散,且通信过程缺乏认证及安全措施,因此极易成为被攻击的目标。近年来发生的"震网"病毒事件等加剧了工业SCADA控制系统信息安全问题的严重性。为了保证新能源领域SCADA系统的自主可控,本文针对新能源领域SCADA系统进行嵌入国产密码技术的研究与改造,并且提出其对应的改造方案。  相似文献   

11.
Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructures such as water distribution networks, electricity generation and distribution plants, oil refineries, nuclear plants, and public transportation systems. However, the increased use of standard protocols and interconnectivity has exposed SCADA systems for potential cyber-attacks. In recent years, the cyber-security of SCADA systems has become a hot issue for governments, industrial sectors and academic community. Recently some security solutions have been proposed to secure SCADA systems. However, due to the critical nature of SCADA systems, evaluation of such proposed solutions on real system is im-practical. In this paper, we proposed an easily scalable and reconfigurable virtual SCADA security testbed, which can be used for developing and evaluating SCADA specific security solutions. With Distributed Denial of Service (DDoS) and false data injection attack scenarios, we demonstrated how attackers could disrupt the normal operation of SCADA systems. Experimental results show that, the pro-posed testbed can be effectively used for cyber security assessment and vulner-ability investigation on SCADA systems. One of the outcomes of this work is a labeled dataset, which can be used by researchers in the area of SCADA security.  相似文献   

12.
Supervisory Control and Data Acquisition (SCADA) systems are deployed worldwide in many critical infrastructures ranging from power generation, over public transport to industrial manufacturing systems. Whilst contemporary research has identified the need for protecting SCADA systems, these information are disparate and do not provide a coherent view of the threats and the risks resulting from the tendency to integrate these once isolated systems into corporate networks that are prone to cyber attacks. This paper surveys ongoing research and provides a coherent overview of the threats, risks and mitigation strategies in the area of SCADA security.  相似文献   

13.
数据采集与监视控制(SCADA)系统是国家基础设施的重要组成部分,然而近年来SCADA系统一直遭受网络攻击的威胁。在分析SCADA通信协议脆弱性的基础上,描述了23种基于MODBUS的SCADA系统可能面临的网络威胁,这些威胁可分为四大类:信息扫描、响应注入、命令注入以及拒绝服务。利用SCADA系统与物理系统交互的特性,设计了基于协议缺陷和基于系统状态的检测规则。在实验室天然气管道系统的环境下,进行了基于Snort的入侵检测实验,结果验证了入侵检测规则的有效性。  相似文献   

14.
Industrial control system security has been a topic of scrutiny and research for several years, and many security issues are well known. However, research efforts are impeded by a lack of an open virtual industrial control system testbed for security research. This paper describes a virtual testbed framework using Python to create discrete testbed components including virtual devices and process simulators. The virtual testbed is designed such that the testbeds are inter-operable with real industrial control system devices and such that the virtual testbeds can provide comparable industrial control system network behavior to a laboratory testbed. Two virtual testbeds modeled upon actual laboratory testbeds have been developed and have been shown to be inter-operable with real industrial control system equipment and vulnerable to attacks in the same manner as a real system. Additionally, these testbeds have been quantitatively shown to produce traffic close to laboratory systems.  相似文献   

15.
开放互联的网络和信息与物理组件的交互使得信息物理系统面临着巨大的安全挑战,通过研究信息物理系统的安全目标和攻击模型,给出了分层的信息物理系统安全体系. 信息物理系统安全主要是解决在恶意攻击下的加密技术,访问控制策略,弹性机制等问题,在介绍了信息物理系统安全方面的相关研究后,对信息物理系统安全体系中的关键技术——访问控制策略和隐私数据保护进行了深入的研究.  相似文献   

16.
Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these systems. This paper presents an innovative framework for an experimentation environment that can reproduce concurrently physical and cyber systems. The proposed approach uses an emulation testbed based on Emulab to recreate cyber components and a real-time simulator, based on Simulink, to recreate physical processes. The main novelty of the proposed framework is that it provides a set of experimental capabilities that are missing from other approaches, e.g. safe experimentation with real malware, flexibility to use different physical processes. The feasibility of the approach is confirmed by the development of a fully functional prototype, while its applicability is proven through two case studies of industrial systems from the electrical and chemical domain.  相似文献   

17.
Mid 2010, a sophisticated malicious computer worm called Stuxnet targeted major ICS systems around the world causing severe damages to Siemens automation products. Stuxnet proved its ability to infect air-gapped-segregated critical computers control system. After this attack, the whole ICS industry security was thrust into spotlight. Automation suppliers have already started to re-think their business approach to cyber security. The OPC foundation have made also significant changes and improvements on its new design OPC-UA to increase security of automation applications but, what is still missing and seems to be not resolved any time soon is having security in depth for industrial automation applications. In this paper, we propose a simple but strong security control solution to be implemented as a logic level security on SCADA and DCS systems. The method presented in this work enforces message integrity to build trusts between DCS system components, but it should not be viewed as the main nor the only protection layer implemented on an industrial automation system. The proposed solution can be viewed as a low-level security procedure to avoid malicious attacks such as Stuxnet.  相似文献   

18.
靳骁  葛慧  马锐 《计算机科学》2018,45(Z11):377-381
当前的网络空间中,防御方往往在攻防博弈中处于被动地位,这种现状可以通过构建动态赋能的网络空间防御体系来改变。通过 研究 基于动态赋能的网络空间防御体系,从网络、软件、平台、数据4个方面梳理提升传统网络空间安全性的关键动态技术,以及构建动态赋能的网络空间的方法;通过结合攻防两方面对动态赋能网络进行安全效能评估,证明了动态赋能网络空间防御体系在提高系统安全防御能力方面的贡献。  相似文献   

19.
当前数据采集与监控系统(supervisory control and data acquisition, SCADA)系统面临着巨大的安全威胁,对其风险状况进行监测和评估是一项有效的应对措施。为有效处理评估过程中存在的模糊性和随机性问题,将云模型理论引入SCADA系统安全风险评估中,提出了一种基于云模型和组合权重的安全风险评估模型。该模型从SCADA系统的资产、威胁、脆弱性、安全措施4方面构建安全风险评估指标体系,采用最小二乘法求出评估指标的最优组合权重,借助云发生器得到评估指标的云模型数字特征和SCADA系统的综合评估云,然后基于黄金分割率构建标准评估云,同时结合改进的云相似度计算方法得出最终评估结果,最后通过实验验证了模型的有效性和可行性。研究结果表明,该模型能够得到准确的评估结果,与模糊综合评价等方法相比,该评估方法具备更高的可信性,评价效果更好。该方法不仅有助识别SCADA系统的安全风险威胁,而且为其他领域的安全风险评估提供了一定的参考。  相似文献   

20.
网络空间安全己被正式批准列为一级学科,该学科的人才培养与己有学科的联系与区别值得深入探讨。分析了该学科和信息与通信工程、计算机科学与技术等相关一级学科的关系,给出了网络空间安全学科的知识体系,将其分为网络空间安全基础理论、物理安全、网络安全、系统安全、数据和信息安全等5个大的学科领域。借鉴基于产出的教育模式,提出了该学科硕士和博士研究生的培养标准,并提出了涵盖5个方向的模块化参考课程体系。最后,给出了对网络空间安全学科人才培养的一些建议。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号