列控系统信息安全风险主动防御研究
[Abstract]:With the increasing risk of information security in rail transit train operation control system, considering the particularity and complexity of the system, the information security solution of general industrial control system can not be applied to train control system well. At present, the research on information security defense technology of train control system at home and abroad is few and deep, and the characteristics of data driving of train control system are not fully considered. Defense does not combine industry features such as Safety redundancy and Fault-Security. Therefore, under the background of information and network of train control system, it is of great significance to study the active defense technology of information security combined with the characteristics of the system. Based on the above considerations, this paper mainly studies information security modeling and defense policy selection of train control systems. The attack game tree (Attack Countermeasure tree is introduced into the attack and defense modeling of train control system, and the definition of ACT model is revised to better describe the characteristics of the system. On this basis, the information security defense target of train control system is proposed, and the method of selecting optimal active defense strategy is given. The main contents of this paper are as follows: (1) the current situation of information security in industrial control and train control systems is studied. Taking the communication based train control (Communication-based Train) system based on WLAN (Wireless Local Area Networks as the research object, the information security related contents of train control system, including information security requirements, system network vulnerability, attack surface, are analyzed emphatically. Typical attack and defense technology, especially active defense technology. (2) Information security active defense modeling method based on attack game tree is studied. Firstly, the typical security modeling methods such as attack tree, defense tree, attack defense tree and Bayesian defense graph are analyzed, and their limitations are pointed out. Then the attack game tree and its probability calculation, qualitative analysis and quantitative analysis are introduced as information security analysis tools, and the ACT model is modified to make it more suitable for the information security modeling of train control system. The modeling steps are given. (3) an optimal policy selection method for information security of train control systems is proposed. Firstly, by analyzing the characteristics and requirements of train control system, the optimal defense target and its formal expression of train control system are put forward, and then based on the attack process of general industrial control system, the attack classification to train control system is given. Then the numerical model of quantitative analysis of attack and defense is determined. Finally, the algorithm of solving the optimal defense strategy based on qualitative and quantitative analysis is given. (4) the application of active defense model and optimal defense strategy selection method. By analyzing the minimum information flow definition system of CBTC system based on WLAN as the analysis object, the ACT model is established, and the optimal strategy considering security and efficiency in the train control system is solved by quantifying the model, and the defense effect is verified. The analysis results show that the active defense model of train control system based on attack game tree presented in this paper can well reflect the interaction of train control system attack, detection and mitigation events. The proposed defense target and optimal strategy selection method can efficiently find out the optimal strategy which accords with the system security and efficiency goals, and can realize the multi-objective optimization. The experimental results show that the proposed method is scientific and efficient.
【学位授予单位】:北京交通大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:U284.48;TP309
【相似文献】
相关期刊论文 前10条
1 程剑锋;王东;贺广宇;;基于仿真平台的列控系统自动测试研究[J];中国铁路;2012年02期
2 杨韬;;列控系统数据校核技术研究[J];铁路通信信号工程技术;2013年S1期
3 王嵩;孙其泰;;适用于我国Ⅲ、Ⅳ级铁路的列控系统[J];铁道通信信号;2013年12期
4 邹振民,杉江广幸 ,久保田清登 ,原田英;日本东海道新干线采用的新型列控系统[J];铁道通信信号;2003年01期
5 傅世善;;闭塞与列控概论 第二讲 列控系统的速度控制模式[J];铁路通信信号工程技术;2004年06期
6 傅世善;;闭塞与列控概论 第四讲 典型的列控系统[J];铁路通信信号工程技术;2005年02期
7 王长林,肖鹏,康太平;列控系统安全防护技术模型及研究[J];交通运输工程与信息学报;2005年01期
8 邹少文;客运专线列控系统模式探讨[J];铁道工程学报;2005年01期
9 鲁志彤;;欧洲列控系统与中国列控系统的比较[J];天津科技;2009年02期
10 杜平;;城际铁路列控系统方案探讨[J];铁路通信信号工程技术;2010年02期
相关会议论文 前4条
1 管建华;王海忠;;高速客运专线列控系统方案的思考[A];铁路客运专线建设技术交流会论文集[C];2005年
2 范丽君;;秦沈线TVM430系统点式功能的探讨[A];铁道科学技术新进展——铁道科学研究院五十五周年论文集[C];2005年
3 吕书丽;;列控系统车载设备发展浅谈[A];科技、工程与经济社会协调发展——中国科协第五届青年学术年会论文集[C];2004年
4 吕书丽;;列控系统车载设备发展浅谈[A];快速提升铁路建设与装备现代化技术促进铁路跨越式发展——中国科协第五届青年学术年会第九分会场论文集[C];2004年
相关重要报纸文章 前4条
1 本报特约记者 杨光和;C3之光照亮绚丽人生[N];人民铁道;2010年
2 记者 张丽华 李娟;铁道部彻查列控系统 直指“通号系”[N];第一财经日报;2011年
3 本报记者 宋菁;广深港高铁全面检测列控系统[N];21世纪经济报道;2011年
4 邵文杰;信号控制技术具有自主知识产权[N];光明日报;2007年
相关博士学位论文 前8条
1 谢雨飞;列控系统需求规范形式化建模与验证方法研究[D];北京交通大学;2012年
2 吕继东;列车运行控制系统分层形式化建模与验证分析[D];北京交通大学;2011年
3 谭平;城际铁路车载列控系统安全及智能控制关键技术研究[D];浙江大学;2014年
4 蔡伯根;低成本列控系统的列车组合定位理论与方法[D];北京交通大学;2010年
5 曹源;高速铁路列车运行控制系统的形式化建模与验证方法研究[D];北京交通大学;2011年
6 张亚东;高速铁路列车运行控制系统安全风险辨识及分析研究[D];西南交通大学;2013年
7 邢小琴;高速铁路GSM-R网络检测/监测数据分析关键技术研究[D];中国铁道科学研究院;2014年
8 刘金涛;基于STPA的需求阶段的高速列车运行控制系统安全分析方法研究[D];北京交通大学;2015年
相关硕士学位论文 前10条
1 程瑞军;列控系统混成行为的建模与验证方法[D];北京交通大学;2014年
2 王建;基于随机Petri网的高铁列控系统C2/C3等级转换过程建模及仿真[D];西南交通大学;2015年
3 刘润;CPS系统动态行为在线建模与验证研究[D];南京大学;2016年
4 王锡奎;面向领域特征的列控系统车载ATP软件建模方法研究[D];北京交通大学;2016年
5 周慧英;基于STeC的列控系统的建模与验证[D];贵州大学;2016年
6 徐蛟;面向列控安全性监控的运行时验证方法研究[D];国防科学技术大学;2014年
7 安越;基于UML和TA的RBC系统形式化建模与分析[D];兰州交通大学;2016年
8 丁春平;基于域+Timed RAISE的列控系统等级转换场景建模与验证[D];兰州交通大学;2016年
9 武亦儒;基于接口模型的失效传播分析及其在列控系统中的应用[D];北京交通大学;2017年
10 滕昌敏;端到端通信在列控系统中应用的研究[D];北京交通大学;2017年
,本文编号:2160483
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2160483.html