首页 | 官方网站   微博 | 高级检索  
     

基于攻击树模型的数传电台传输安全性评估
引用本文:李慧,张茹,刘建毅,赵静. 基于攻击树模型的数传电台传输安全性评估[J]. 信息网络安全, 2014, 0(8): 71-76
作者姓名:李慧  张茹  刘建毅  赵静
作者单位:北京邮电大学信息安全中心,北京100876
基金项目:国家科技支撑计划[2012BAH08802]、国家高技术研究发展计划[2012AA012606]、中央高校基本科研业务费专项资金[2013RC0310]、教育部科技发展中心网络时代科技论文快速共享专项研究课题[2013114]、数字版权研发工程项目[1681300000119]、北京高等学校青年英才计划[YETP0448]
摘    要:数传电台在数据采集与监视控制系统中广泛应用,其传输安全也受到越来越大的挑战。文章为了系统分析评估数据采集与监视控制系统中数传电台传输的安全性,针对数传电台传输阶段可能存在的风险,采用攻击树建模方法,对传统攻击树进行改进,重新定义了攻击节点,量化了叶子节点的攻击风险,建立了以威胁数据采集与监视控制系统安全为攻击目标的攻击树模型,在攻击树的基础上可以直观地反映各种可能的攻击图景。并根据攻击树计算出了各攻击图景发生的概率,根据多攻击图景考虑系统总的安全性。最后利用安全性灵敏度,定量分析各攻击方式发生概率变化对系统安全性的影响,找出对系统安全性影响较大的关键方式,提出提高系统安全水平的措施。文中攻击树模型可以用于评估系统风险,区分不同攻击方式对系统的不同安全威胁程度,由此为决策者采取相应的数传电台传输保护措施提供依据。

关 键 词:攻击树  数据采集与监视控制系统  数传电台传输  安全性评估  攻击图景

Safety Assessment on Digital Radio Transmission based on Attack Tree Model
LI Hui,ZHANG Ru,LIU Jian-yi,ZHAO Jing. Safety Assessment on Digital Radio Transmission based on Attack Tree Model[J]. Netinfo Security, 2014, 0(8): 71-76
Authors:LI Hui  ZHANG Ru  LIU Jian-yi  ZHAO Jing
Affiliation:(Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China)
Abstract:Digital radio is widely used in supervisory control and data acquisition system, and the transmission security is increasingly challenged. In order to systematically analyze and assess the digital radio transmission security in supervisory control and data acquisition system, this paper uses attack tree modeling method for the existing risk in the digital radio transmission stage, improves the traditional attack tree, refines attack nodes, quantifies the attack risk of leaf nodes, and establishes an attack tree model in which threats to the supervisory control and data acquisition system is the target. And it directly relfects the various possible attack picture based on the attack tree. This paper calculates the probability of the occurrence of each attack picture based on attack tree, and considers the overall safety of the system under various attack pictures. Finally, it analyzes quantitatively the impact of each change in the probability of attacks on the system security based on security sensitivity. And it identiifes the key way which has a greater impact on system security, and proposes measures to improve the system security level. This attack tree model can be used to assess systemic risk and to distinguish different security threat levels of different attacks to the system, thus to provide a basis for decision-makers to take appropriate protective measures for the digital radio transmission.
Keywords:attack tree  data acquisition and supervisory control system  digital radio transmission  safety assessment  attack picture
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号