首页 | 本学科首页   官方微博 | 高级检索  
     

面向智慧城市的数据驱动信息物理系统安全威胁分析模型与方法
引用本文:蒋建春,肖佳平,唐琨. 面向智慧城市的数据驱动信息物理系统安全威胁分析模型与方法[J]. 计算机系统应用, 2018, 27(7): 50-56
作者姓名:蒋建春  肖佳平  唐琨
作者单位:中国科学院 软件研究所, 北京 100190,中国科学院 软件研究所, 北京 100190,南宁市发展和改革委员会, 南宁 530028
基金项目:南宁市大数据关键信息基础设施安全体系研究(2017 NCCJA043)
摘    要:信息物理系统(CPS)是一个集成计算、通信和物理过程的混成系统,在智慧城市中占据至关重要的地位,其安全问题面临许多挑战.本文首先建立信息物理系统安全威胁分析模型,给出CPS各个组成部件的安全威胁,然后提出了信息物理系统的威胁关联分析方法,并以智能电网为例给出实验测试结果.结果表明,该方法能实现快速大规模安全威胁建模和自动化分析,为智慧城市中的关键信息基础设施提供技术支撑.最后,本文总结了智慧城市中信息物理系统的安全威胁研究进展和未来研究方向.

关 键 词:智慧城市  信息物理系统  入侵检测  高级持续威胁  硬件威胁
收稿时间:2017-11-29
修稿时间:2017-12-12

Data-Driven Cyber-Physical System Security Threat Analysis Model and Method for Smart Cities
JIANG Jian-Chun,XIAO Jia-Ping and TANG Kun. Data-Driven Cyber-Physical System Security Threat Analysis Model and Method for Smart Cities[J]. Computer Systems& Applications, 2018, 27(7): 50-56
Authors:JIANG Jian-Chun  XIAO Jia-Ping  TANG Kun
Affiliation:Institute of Software, Chinese Academy of Sciences, Beijing 100190, China,Institute of Software, Chinese Academy of Sciences, Beijing 100190, China and Nanning Municipal Development & Reform Commission, Nanning 530028, China
Abstract:A Cyber-Physical System (CPS) is a mixed system integrated with computation, communication, and physical processes, which takes an important position in the smart city, and there are many challenges in its security issues. Firstly, we establish a cyber security model for CPS, providing with the security threats of various components of CPS. Then, we propose a CPS threats analysis method and provide experimental test results. The results show that this method can achieve rapid large-scale security threat modeling and automatic analysis. Consequently, it can provide technical supports for the security assurance of the key information infrastructures in smart cities. Finally, we summarized the research advance and future research direction of security threats on CPS in the smart city.
Keywords:smart city  Cyber-Physical Systems (CPS)  intrusion detection  advanced persistent threat  hardware threat
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号