(1 State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China; 2 Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China; 3 Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang 110169, China; 4 University of Chinese Academy of Sciences, Beijing 100049, China)
Abstract: With the rapid development of industrial wireless networks, security incidents are constantly emerging, and network survivability has become one of the focuses of attention in this field. This paper focuses on the security issues in industrial wireless networks, and takes attack intention as the starting point to conduct research on the evaluation of the resilience of industrial wireless networks. Firstly, by analyzing known attack cases, multiple types of attacks and their potential impacts are identified. Then, different from existing evaluation methods for the characteristics of network systems themselves, a comprehensive survivability evaluation method is constructed by taking into account the potential intent of the attack. Finally, on an industrial wireless network system model, by comparing it with existing popular network system survivability evaluation methods, it is found that the proposed attack intent based industrial wireless network survivability evaluation method in this paper has a more objective and stable evaluation effect.
Key words : attack intention; security risk measurement; Industrial Internet of Things; security threat
引言
當下,工業(yè)網(wǎng)絡(luò)(Industrial Wireless Internet)作為先進制造業(yè)的核心,,已經(jīng)廣泛應(yīng)用于工廠自動化,、供應(yīng)鏈管理、設(shè)備監(jiān)測等領(lǐng)域[1-3],。然而,,隨著工業(yè)物聯(lián)網(wǎng)(Industrial Internet of Things,IIoT)技術(shù)的迅猛發(fā)展,安全問題逐漸浮現(xiàn),,成為制約其進一步發(fā)展的主要瓶頸之一,。工業(yè)物聯(lián)網(wǎng)系統(tǒng)中涉及的大量設(shè)備、傳感器和網(wǎng)絡(luò)架構(gòu),為潛在的攻擊者提供了可乘之機,,可能導(dǎo)致生產(chǎn)中斷,、數(shù)據(jù)泄露、設(shè)備損壞等嚴重后果,。工業(yè)物聯(lián)網(wǎng)中常見的安全威脅包括[4-8]:(1)設(shè)備漏洞和弱點:IIoT系統(tǒng)中的設(shè)備和傳感器可能存在未修補的漏洞和弱點,,攻擊者可以利用這些漏洞來獲取非法訪問、控制設(shè)備,,或者干擾設(shè)備正常運行,。(2)惡意軟件和病毒: 攻擊者可以通過惡意軟件和病毒感染IIoT系統(tǒng),從而損壞設(shè)備,、竊取數(shù)據(jù)或干擾生產(chǎn)流程,。(3)網(wǎng)絡(luò)攻擊: IIoT系統(tǒng)的網(wǎng)絡(luò)通信可能受到各種網(wǎng)絡(luò)攻擊,如DDoS(分布式拒絕服務(wù))攻擊,、入侵,、劫持等,從而導(dǎo)致網(wǎng)絡(luò)不穩(wěn)定或癱瘓,。(4)供應(yīng)鏈攻擊: 攻擊者可能通過操縱供應(yīng)鏈中的元件或設(shè)備,,在制造過程中引入惡意代碼或漏洞,從而影響整個生產(chǎn)流程和產(chǎn)品質(zhì)量,。