首页 | 本学科首页   官方微博 | 高级检索  
     检索      

时间触发以太网时钟同步协议攻击行为的性能评估方法
引用本文:刘策越,郭宏,张先国.时间触发以太网时钟同步协议攻击行为的性能评估方法[J].科学技术与工程,2020,20(28):11698-11705.
作者姓名:刘策越  郭宏  张先国
作者单位:中国电子科技集团公司第十五研究所,北京100083;北京航空航天大学自动化科学与电气工程学院,北京100191
基金项目:科技部项目(2016YFB0801400)
摘    要:时间触发以太网时钟同步协议的PCF帧(Protocal Control Frames)是决定该网络能否正常工作的核心要素,一旦发生针对PCF帧的攻击行为,可能会导致整个时间触发以太网的时序错乱和瘫痪。为了更好的深入分析这种攻击行为,本文提出一种针对PCF帧的攻击行为的性能评估方法,可对攻击者能力和攻击造成的影响进行有效评估。首先以不同阶段的时钟同步过程为考量依据,对攻击行为的实施过程和造成的影响进行详细分析,建立针对PCF帧的攻击行为分类框架。然后对攻击行为的要素进行分析提取,并结合量化参数,推导出攻击行为性能量化的数学表述。最后通过典型示例,对提出的方法进行应用说明,结果表明,本文的方法可以较为合理的对攻击效能进行评估。

关 键 词:时间触发以太网  时钟同步协议  攻击行为  评估方法
收稿时间:2020/3/10 0:00:00
修稿时间:2020/6/19 0:00:00

Performance evaluation method of attack behavior of clock synchronization protocol in Time-Triggered Ethernet
LIU Ce-yue,GUO Hong,ZHANG Xian-guo.Performance evaluation method of attack behavior of clock synchronization protocol in Time-Triggered Ethernet[J].Science Technology and Engineering,2020,20(28):11698-11705.
Authors:LIU Ce-yue  GUO Hong  ZHANG Xian-guo
Institution:The 15th Research Institute of China electronic technology group Corporation;School of Automation Science and Electrical Engineering,BEIHANG University; The th Research Institute of China electronic technology group Corporation
Abstract:The PCF frame of clock synchronization protocol of Time-Triggered Ethernet is the core element to determine whether the network can work normally. Once the attack against PCF frame occurs, the timing of Time-Triggered Ethernet may be disordered and paralyzed. In order to better analyze the attack behavior, a performance evaluation method was proposed, which can effectively assess the capabilities of attackers and the impact of attacks. Firstly, based on the different stages of clock synchronization process, the implementation process and impact of the attack were analyzed in detail, and the attack classification framework for PCF frame was established. Then, the elements of attack behavior were analyzed and extracted, and combined with the quantitative parameters, the quantitative mathematical expression of attack behavior performance was derived. Finally, a typical example is given to illustrate the application of the proposed method. The results show that the method can reasonably evaluate the attack effectiveness.
Keywords:Time-Triggered Ethernet  clock synchronization protocol  attack  performance evaluation method
本文献已被 万方数据 等数据库收录!
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号