[1]刘劲威,曹谢东,徐诗艺,等.云模型油气SCADA系统信息安全评价研究[J].智能系统学报,2018,13(02):296-302.[doi:10.11992/tis.201609001]
 LIU Jinwei,CAO Xiedong,XU Shiyi,et al.Research on information security evaluation of oil and gas SCADA system in cloud model[J].CAAI Transactions on Intelligent Systems,2018,13(02):296-302.[doi:10.11992/tis.201609001]
点击复制

云模型油气SCADA系统信息安全评价研究(/HTML)
分享到:

《智能系统学报》[ISSN:1673-4785/CN:23-1538/TP]

卷:
第13卷
期数:
2018年02期
页码:
296-302
栏目:
出版日期:
2018-04-15

文章信息/Info

Title:
Research on information security evaluation of oil and gas SCADA system in cloud model
作者:
刘劲威 曹谢东 徐诗艺 李顺鑫 赵梦辉
西南石油大学 电气信息学院, 四川 成都 610500
Author(s):
LIU Jinwei CAO Xiedong XU Shiyi LI Shunxin ZHAO Menghui
School of Electrical Information Engineering, Southwest Petroleum University, Chengdu 610500, China
关键词:
SCADA系统云模型因素空间安全评价MATLAB仿真信息安全事中因素因素藤网
Keywords:
SCADA systemcloud modelfactor spacesafety evaluationMATLAB simulationinformation safetyintermiate factorsfactor rattan net
分类号:
TP181
DOI:
10.11992/tis.201609001
摘要:
信息技术的迅猛发展,油气SCADA系统的信息随时可能泄露,所以有必要对其进行安全评价。因此,本文根据SCADA系统的事件发生前期、中期、后期的防御技术体系,分析其评价指标,并将评价指标映射到因素上,然后采用了因素空间理论建立了信息安全评价的因素模型;针对评价模型的事中因素,引入云模型推理对其进行评价,并通过MATLAB软件实现云模型推理算法。实验结果表明,该方法达到了较好的评价效果,也为信息安全评价的方法提供了一种新思路。
Abstract:
With the rapid development of information technology, the SCADA system of oil and gas is facing a more serious problem of information security. This paper firstly analyzed and studied the condition factors of information security evaluation on events happening before, during and after in the oil and gas SCADA system, mapped the evaluation indices onto the factors, then established a rattan net model of information security evaluation of oil and gas SCADA system based on the theory of factor space, and introduced theory of cloud model to evaluate the factor on events happening during in the evaluation model, finally achieves the cloud model reasoning algorithm through MATLAB. The experimental results show that the reasoning method based on cloud model can well realize the evaluation of the factors on events happening during in the oil and gas SCADA system, which provides a new way for information security evaluation of oil and gas SCADA system.

参考文献/References:

[1] 饶志宏, 兰昆, 蒲石. 工业SCADA系统信息安全技术[M]. 北京: 国防工业出版社, 2014: 83-120.
RAO Zhihong, LAN Kun, PU Shi. Information security technologies on industrial SCADA systems[M]. Beijing: National Defense Industry Press, 2014: 83-120.
[2] 陈冬青, 彭勇, 谢丰. 我国工业控制系统信息安全现状及风险[J]. 中国信息安全, 2012(10): 64-70.
CHEN Dongqing, PENG Yong, XIE Feng. Information security status and risk of China’s industrial control system[J]. China information security, 2012(10): 64-70.
[3] 杜湘瑜, 尹全军, 黄柯棣, 等. 基于云模型的定性定量转换方法及其应用[J]. 系统工程与电子技术, 2008, 30(4): 772-776.
DU Xiangyu, YIN Quanjun, HUANG Kedi, et al. Transformation between qualitative variables and quantity based on cloud models and its application[J]. Systems engineering and electronics, 2008, 30(4): 772-776.
[4] COOK F S. Secure access point for scada devices[P]. US: 8176532, 2012-05-08.
[5] KNAPP E D. 工业网络安全[M]. 北京: 国防工业出版社, 2014: 12-145.
KNAPP E D. Industrial network security[M]. Beijing: National Defense Industry Press, 2014: 12-145.
[6] IEC. IEC 62443-1-1, Security for industrial automation and control systems. Part 1-1 terminology, concepts, and models[S]. IEC, 2013.
[7] 李静. 基于蜜罐日志分析的主动防御研究和实现[D]. 上海: 上海交通大学, 2009.
LI Jing. The research and implementation of initiative defense based on analysis honeypot logs[D]. Shanghai: Shanghai Jiao Tong University, 2009.
[8] 刘增良, 刘有才. 因素神经网络理论及其应用[M]. 贵阳: 贵州科技出版社, 1994.
Liu Zengliang, LIU Youcai. Factor neural networks and its application[M]. Guiyang: Guizhou Science and Technology Press, 1994.
[9] 刘增良, 刘有才. 因素神经网络理论及实现策略研究[M]. 北京: 北京师范大学出版社, 1992.
LIU Zengliang, LIU Youcai. Research on the theory of factor neural nerwork and its realization[M]. Beijing: Research on the throry of factor neural network and its realization, 1992.
[10] 杨朝晖, 李德毅. 二维云模型及其在预测中的应用[J]. 计算机学报, 1998, 21(11): 961-969.
YANG Zhaohui, LI Deyi. Planar model and its application in prediction[J]. Chinese journal of computers, 1998, 21(11): 961-969.
[11] 李静. 基于云模型的C2C卖家信任评价方法研究[D]. 天津: 南开大学, 2009.
LI Jing. Study on the evaluation method of C2C sellers trust based on cloud model[D]. Tianjin: Nankai University, 2009.
[12] 王国胤, 李德毅. 云模型与粒计算[M]. 北京: 科学出版社, 2012: 3-90.
WANG Guoyin, LI Deyi. Cloud model and granular computing [M]. Beijing: Science Press, 2012: 3-90.
[13] 温景容, 武穆清, 宿景芳. 信息物理融合系统[J]. 自动化学报, 2012, 38(4): 507-517.
WEN Jingrong, WU Muqing, SU Jingfang. Cyber-physical system[J]. Acta automatica sinica, 2012, 38(4): 507-517.
[14] FOVINO I N, MASERA M, GUIDI L, et al. An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants[C]//Proceedings of the 3rd Conference on Human System Interactions. Rzeszow, Poland, 2010: 679-686.
[15] 曹谢东. 模糊信息处理及应用[M]. 北京: 科学出社, 2003: 103-104.
CAO Xiedong. Fuzzy information processing and application[M]. Beijing: Science Press, 2003: 103-104.

相似文献/References:

[1]冯 珊,郭四海,等.武器装备虚拟采办技术风险综合评估[J].智能系统学报,2008,3(05):384.
 FENG Shan,GUO Si-hai,ZHOU Kai-bo,et al.A comprehensive means for evaluating techn ical r isk in the simulation based acquisition model for weapon systems[J].CAAI Transactions on Intelligent Systems,2008,3(02):384.
[2]李 众,刘 艳.二维正态云模型的单规则推理映射[J].智能系统学报,2010,5(05):464.[doi:10.3969/j.issn.1673-4785.2010.05.015]
 LI Zhong,LIU Yan.Single rule reasoning mapping for the two dimensional normal cloud model[J].CAAI Transactions on Intelligent Systems,2010,5(02):464.[doi:10.3969/j.issn.1673-4785.2010.05.015]
[3]王辉,秦术,刘少英,等.曲线拟合的逆向云改进算法[J].智能系统学报,2014,9(05):590.[doi:10.3969/j.issn.1673-4785.201304078]
 WANG Hui,QIN Shu,LIU Shaoying,et al.An improved algorithm of backward cloud based on curve fitting[J].CAAI Transactions on Intelligent Systems,2014,9(02):590.[doi:10.3969/j.issn.1673-4785.201304078]
[4]苗夺谦,张清华,钱宇华,等.从人类智能到机器实现模型——粒计算理论与方法[J].智能系统学报,2016,11(6):743.[doi:10.11992/tis.201612014]
 MIAO Duoqian,ZHANG Qinghua,QIAN Yuhua,et al.From human intelligence to machine implementation model: theories and applications based on granular computing[J].CAAI Transactions on Intelligent Systems,2016,11(02):743.[doi:10.11992/tis.201612014]
[5]王洪利.一种参照模糊集的云模型集合论方法研究[J].智能系统学报,2020,15(3):507.[doi:10.11992/tis.201810030]
 WANG Hongli.A method of cloud model set theory referring to fuzzy sets[J].CAAI Transactions on Intelligent Systems,2020,15(02):507.[doi:10.11992/tis.201810030]

备注/Memo

备注/Memo:
收稿日期:2016-09-30。
基金项目:国家自然科学基金项目(61175122);四川省苗子工程项目(2016027).
作者简介:刘劲威,男,1992年生,硕士研究生,主要研究方向为模式识别与智能控制;曹谢东,男,1954年生,教授,突出贡献优秀专家,主持国家自然科学基金项目,承担国家863、国家重大科技攻关项目和省部级项目多项,获四川省科技进步二等奖1项、三等奖2项,专著三部,主要从事人工智能,工业控制信息系统安全、智能测控等方面的研究和应用工作;徐诗艺,女,1993年生,硕士研究生,主要研究方向为模式识别与智能系统,参加“第十二届华为杯电子设计大赛”并获得全国三等奖,发表学术论文1篇。
通讯作者:刘劲威.E-mail:411622401@qq.com.
更新日期/Last Update: 1900-01-01