工业控制网络数据访问控制技术研究与实现
本文选题:工业控制网络 + 访问控制 ; 参考:《电子科技大学》2016年硕士论文
【摘要】:近年来,针对工业控制网络的攻击事件频繁发生,其严重威胁到国家和重要生产部门的安全以及造成了重大的经济损失。最典型的是“震网”病毒攻击伊朗核设备的事件。由于工业控制网络在设计之初被应用于封闭的网络环境中,并未周全的考虑信息安全问题,使得工业控制网络的缺陷完全暴露在外,让入侵者有机可乘,从而发动各种攻击。鉴于此,本文通过设计针对各类攻击的安全方案来实现对工业控制网络信息安全的防护,主要工作为:1、研究了工业控制网络的结构及其结构特点。分析了工业控制网络的脆弱性,由此提出了工业控制网络防御方案。并着重对总方案中的第二层次防御进行研究,设计了针对基于恶意数据包的攻击、欺骗性攻击以及异常流量攻击等的攻击防御方案。2、针对基于恶意数据包的攻击、欺骗性攻击,设计了访问控制防御模型。根据访问控制原理,设计了访问控制防御模型总框架,其包括了数据信息提取和安全策略两大部分。重点设计了安全域、白名单以及针对欺骗性攻击和syn flood攻击的安全策略。在linux平台的netfilter/iptables框架下实现了上述安全策略,并进行测试。3、针对工业控制网络的异常流量攻击,设计了基于多分类支持向量机(SVM)的异常流量检测系统。根据经典CIDF入侵检测系统,设计了异常流量检测系统总框架,其包括了数据信息提取、数据预处理以及异常流量检测模型。结合异常流量攻击特点和二分类SVM,设计了基于多分类SVM的检测模型。在linux平台下结合libsvm软件实现了多分类SVM检测模型的构造,并进行了测试。本文针对工业控制网络的各类攻击,设计的访问控制防御模型和基于多分类SVM的异常流量检测系统,对工控信息安全的发展有着积极的意义。
[Abstract]:In recent years, attacks against industrial control networks occur frequently, which seriously threaten the security of countries and important production departments and cause great economic losses. The most typical attack on Iran's nuclear equipment was the earthquake net virus. Because the industrial control network was applied in the closed network environment at the beginning of the design, it did not consider the information security thoroughly, so that the defects of the industrial control network were completely exposed, so that the intruders could take advantage of it, thus launching all kinds of attacks. In view of this, this paper designs a security scheme for various attacks to protect the information security of industrial control network. The main work is: 1. The structure and structural characteristics of industrial control network are studied. The vulnerability of industrial control network is analyzed, and the defense scheme of industrial control network is put forward. The second level of defense in the total scheme is studied, and the attack defense scheme. 2 is designed for attack based on malicious data packet, deceptive attack and abnormal traffic attack, and deceptive attack against attack based on malicious packet, deceptive attack, etc. An access control defense model is designed. According to the principle of access control, the general framework of access control defense model is designed, which includes two parts: data information extraction and security policy. The security domain, whitelist and security strategy for deceptive attack and syn flood attack are designed. The above security strategy is implemented under the netfilter/iptables framework of linux platform, and the outlier flow detection system based on multi-class support vector machine (SVM) is designed for the abnormal traffic attack of industrial control network. According to the classical CIDF intrusion detection system, the general framework of anomaly traffic detection system is designed, which includes data information extraction, data preprocessing and abnormal traffic detection model. Combined with the characteristics of abnormal traffic attack and two-class SVM, a detection model based on multi-classification SVM is designed. The multi-class SVM detection model is constructed based on linux and libsvm software, and tested. This paper aims at various kinds of attacks of industrial control network, designs the access control defense model and the abnormal flow detection system based on multi-class SVM, which has positive significance for the development of industrial control information security.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:TP393.08
【参考文献】
相关期刊论文 前10条
1 ;工业控制网络安全系列之四 典型的工业控制系统网络安全事件[J];微型机与应用;2015年05期
2 李航;朱广宇;;建立健全我国工业控制系统信息安全体系[J];微型机与应用;2015年01期
3 卢坦;林涛;梁颂;;美国工控安全保障体系研究及启示[J];保密科学技术;2014年04期
4 王得金;江常青;彭勇;;工业控制系统上基于安全域的攻击图生成[J];清华大学学报(自然科学版);2014年01期
5 傅戈;周年荣;文红;;智能电网工业系统通信控制协议的安全研究[J];信息安全与技术;2014年01期
6 朱世顺;黄益彬;朱应飞;张小飞;;工业控制系统信息安全防护关键技术研究[J];电力信息与通信技术;2013年11期
7 陈亚亮;杨海军;姚钦锋;戴沁芸;;工业控制系统网络安全防护体系研究[J];信息网络安全;2013年10期
8 夏德海;;论工控系统安保攻防理念[J];信息安全与技术;2013年10期
9 胡建钧;;工业控制系统信息安全[J];自动化博览;2013年01期
10 陈星;贾卓生;;工业控制网络的信息安全威胁与脆弱性分析与研究[J];计算机科学;2012年S2期
相关博士学位论文 前1条
1 王保义;电力信息系统信息安全关键技术的研究[D];华北电力大学(河北);2009年
相关硕士学位论文 前2条
1 王维剑;基于netfilter/iptables防火墙的设计与实现[D];安徽理工大学;2012年
2 刘飞霞;Linux内核中Netfilter/Iptables防火墙设置分析[D];西安电子科技大学;2012年
,本文编号:1816079
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1816079.html