首页 | 本学科首页   官方微博 | 高级检索  
     

基于攻击树的核电厂DCS系统信息安全脆弱性分析
引用本文:赵庆,刘朝晖,陈智. 基于攻击树的核电厂DCS系统信息安全脆弱性分析[J]. 南华大学学报(自然科学版), 2018, 32(3): 54-59
作者姓名:赵庆  刘朝晖  陈智
作者单位:南华大学计算机学院;中国核动力研究设计院核反应堆系统设计技术重点实验室
摘    要:随着计算机在核电仪控系统中的广泛运用,其信息安全问题受到越来越大的挑战.提出一种基于攻击树的核电仪控系统信息安全脆弱性分析方法,旨在对系统信息安全脆弱性进行量化分析.该方法首先给叶节点赋予三个不同属性,然后采用模糊层次分析法计算各攻击事件属性的权值.最后计算出叶节点、根节点及攻击路径发生概率.实际案例分析表明:计算得出的结果即给出了各节点和攻击路径发生的概率,还指出了攻击者最有可能采取的攻击路径,证明了该方法是合理可行的.基于攻击树的核电仪控系统信息安全脆弱性分析方法对系统管理者建设防御措施有积极的指导意义.

关 键 词:攻击树  信息安全  模糊层次分析法  脆弱性分析
收稿时间:2018-01-29

Information Security Vulnerability Analysis of DCS System in Nuclear Power Plant Based on Attack Tree
ZHAO Qing,LIU Zhaohui and CHEN Zhi. Information Security Vulnerability Analysis of DCS System in Nuclear Power Plant Based on Attack Tree[J]. Journal of Nanhua University(Science and Technology), 2018, 32(3): 54-59
Authors:ZHAO Qing  LIU Zhaohui  CHEN Zhi
Affiliation:School of Computer,University of South China,Hengyang,Hunan 421001,China,School of Computer,University of South China,Hengyang,Hunan 421001,China and Key Laboratory of Reactor System Design Technology of Nuclear Power Institute of China, Chengdu,Sichuan 610041,China
Abstract:Computer is widely used in nuclear power instrumentation and control systems,its information security issues are increasingly challenged.In this essay,an information security vulnerability analysis method for nuclear power control system based on attack tree is proposed to analyze the vulnerability of the system information security.First,the leaf nodes are assigned three different attributes.Then the fuzzy analytic hierarchy process (FAHP) is applied to calculate the weights of the attributes of each attack.Finally,the probability of leaf node,root node and attack path are calculated.The actual case analysis shows that the calculated result gives the probability of each node and the attack path,and points out the attack path that the attacker is most likely to take,which proves that the method is reasonable and feasible.The information security vulnerability analysis method of nuclear power plant control system based on attack tree is of positive guidance to the system manager to build the defense measures.
Keywords:attack tree  information security  fuzzy analytic hierarchy process  vulnerability analysis
本文献已被 CNKI 等数据库收录!
点击此处可从《南华大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《南华大学学报(自然科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号