首页 | 本学科首页   官方微博 | 高级检索  
     

网络攻击下的信息物理系统安全性研究综述
引用本文:叶丹,靳凯净,张天予.网络攻击下的信息物理系统安全性研究综述[J].控制与决策,2023,38(8):2243-2252.
作者姓名:叶丹  靳凯净  张天予
作者单位:东北大学 信息科学与工程学院,沈阳 110819;东北大学 流程工业综合自动化国家重点实验室,沈阳 110819
基金项目:国家自然科学基金项目(62173071);中央高校基本科研业务费专项资金项目(N2204008,N2304001).
摘    要:随着信息物理系统在现代工业和制造业中的广泛应用,其安全性逐渐成为关系社会健康发展的重要因素.由于信息物理系统内部物理设备和通信网络的深度融合,网络攻击对系统安全的威胁日益凸显.首先,从攻击者角度总结各类网络攻击的特点,揭示系统在不同攻击下的脆弱性;其次,针对不同网络攻击的特性,从防御者角度对信息物理系统的安全状态估计、攻击检测和安全控制进行介绍,并阐述各防御策略的主要应用场景和优势;最后,对信息物理系统安全性研究面临的主要挑战进行展望.

关 键 词:信息物理系统  网络攻击  安全状态估计  攻击检测  安全控制

A survey on security of cyber-physical systems under network attacks
YE Dan,JIN Kai-jing,ZHANG Tian-yu.A survey on security of cyber-physical systems under network attacks[J].Control and Decision,2023,38(8):2243-2252.
Authors:YE Dan  JIN Kai-jing  ZHANG Tian-yu
Affiliation:College of Information Science and Engineering,Northeastern University,Shenyang 110819,China;State Key Laboratory of Synthetical Automation of Process Industries,Northeastern University,Shenyang 110819,China
Abstract:With the wide application in modern industry and manufacturing, the security of cyber-physical systems has gradually become an important factor to ensure the healthy development of society, and has received extensive attention from scholars. Due to the deep integration of physical devices and communication networks within cyber-physical systems, the threat of network attacks on system security is becoming increasingly prominent. In this paper, we first summarize the characteristics of various network attacks from the attacker''s perspective, and reveal the vulnerability of systems under different attacks. Secondly, in view of the characteristics of different network attacks, the secure state estimation, attack detection and secure control of cyber-physical systems are introduced from the defender''s perspective, and the main application scenarios and advantages of each defense strategy are presented. Finally, the major challenges for the study of cyber-physical system security are proposed.
Keywords:
点击此处可从《控制与决策》浏览原始摘要信息
点击此处可从《控制与决策》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号