首页 | 本学科首页   官方微博 | 高级检索  
     

基于攻击图的信息物理融合系统渗透测试方法
引用本文:徐丙凤,何高峰.基于攻击图的信息物理融合系统渗透测试方法[J].计算机科学,2018,45(11):143-148.
作者姓名:徐丙凤  何高峰
作者单位:南京林业大学信息科学技术学院 南京210037,南京邮电大学物联网学院 南京210003
基金项目:本文受南京林业大学高层次人才科研启动基金(GXL016),南京林业大学校青年创新基金(CX2016026),国家自然科学基金青年科学基金项目(61702282),江苏省高等学校自然科学研究项目(17KJB520023),南京邮电大学引进人才科研启动基金(NY217143)资助
摘    要:信息物理融合系统(Cyber-Physical System,CPS)多为安全攸关系统,是网络攻击的高价值目标,需要对其进行有效的安全评估。为此,提出一种基于攻击图的信息物理融合系统渗透测试方法。首先,对传统攻击图进行改进,考虑物理攻击、攻击持续时间以及物理系统的连续变量值,提出适用于CPS的攻击图建模技术AGC(Attack Graph for CPS),并在图中增加攻击可行性参数以表示单步攻击的成功率;其次,基于AGC提出最优攻击路径选择策略,包括最小攻击代价、最短攻击时间等,并设计面向CPS的智能渗透测试算法;最后,通过应用实例对方法的有效性进行验证。分析结果表明,该方法能够根据渗透测试目标选择最优攻击路径,并能根据实际反馈结果自动调整后续攻击步骤,有效实现CPS的安全评估。

关 键 词:信息物理融合系统  安全评估  攻击图  最优攻击路径
收稿时间:2017/9/20 0:00:00
修稿时间:2017/12/23 0:00:00

Penetration Testing Method for Cyber-Physical System Based on Attack Graph
XU Bing-feng and HE Gao-feng.Penetration Testing Method for Cyber-Physical System Based on Attack Graph[J].Computer Science,2018,45(11):143-148.
Authors:XU Bing-feng and HE Gao-feng
Affiliation:College of Information Science and Technology,Nanjing Forestry University,Nanjing 210037,China and School of Internet of Things,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
Abstract:As a typical example of security-related system,cyber-physical system (CPS) is the high-value target of network attack.Therefore,its security protection needs to be effectively assessed.To this end,a penetration testing method for CPS based on attack graph is proposed.Firstly,the traditional attack graph is improved and a new attack graph for CPS (AGC) is proposed.Specifically,the physical attack,the duration of the attack and the continuous variable value of physical system are considered in AGC.Additionally,the attack feasibility parameter is added to represent the success rate of single-step attack.Secondly,based on AGC,the optimal attack path selection strategies are represented,including the minimum attack cost,the shortest attack time and so on.Furthermore,the intelligent penetration testing algorithm is designed to accomplish automated penetration.Finally,the effectiveness of the proposed method is verified by case study.The results show that the method can select the optimal attack path to the target,intelligently adjust the subsequent attack steps according to the feedback,and assess the security of CPS effectively.
Keywords:Cyber-physical system  Security assessment  Attack graph  Optimal attack path
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号