浏览全部资源
扫码关注微信
1.信息工程大学,河南 郑州 450001
2.河南工程学院,河南 郑州 450001
[ "王红敏(1989‒ ),女,信息工程大学讲师,主要研究方向为工业控制系统安全入侵检测、风险评估。" ]
[ "韩少云(1991‒ ),男,博士,河南工程学院讲师,主要研究方向为工业软件安全、机器学习、数据挖掘。" ]
[ "魏强(1979‒ ),男,博士,信息工程大学教授,主要研究方向为网络与信息系统安全、软件脆弱性分析、云计算安全、工控系统安全、智能终端安全、软件定义网络等。" ]
[ "宋思静(2000‒ ),女,信息工程大学博士生,主要研究方向为工业控制系统协议安全。" ]
收稿日期:2024-09-19,
修回日期:2024-10-27,
纸质出版日期:2025-06-10
移动端阅览
王红敏,韩少云,魏强等.工业控制系统安全一体化风险评估方法[J].物联网学报,2025,09(02):139-151.
WANG Hongmin,HAN Shaoyun,WEI Qiang,et al.An integrated risk assessment method for industrial control system security[J].Chinese Journal on Internet of Things,2025,09(02):139-151.
王红敏,韩少云,魏强等.工业控制系统安全一体化风险评估方法[J].物联网学报,2025,09(02):139-151. DOI: 10.11959/j.issn.2096-3750.2025.00412.
WANG Hongmin,HAN Shaoyun,WEI Qiang,et al.An integrated risk assessment method for industrial control system security[J].Chinese Journal on Internet of Things,2025,09(02):139-151. DOI: 10.11959/j.issn.2096-3750.2025.00412.
工业控制系统(ICS
industrial control system)关乎国家关键基础设施的正常运行,随着系统开放度的增大,工业控制系统面临信息域和物理域的双重风险,过去只对功能安全或信息安全某一方面进行风险评估已不再适用,因此,提出了对工业控制系统安全一体化的风险评估方法。在安全一体化风险量化评估过程中,风险传播路径分析、风险传播路径可能性计算和安全风险损失值量化是影响评估准确性的关键要素。首先,该方法结合Petri Net与蝴蝶结模型(bow-tie)各自的优势,分析了信息安全风险传播路径、功能安全风险传播路径和风险跨域传播路径。然后,运用专家知识、三角模糊数和质心公式计算功能安全风险传播的可能性,并基于漏洞评分系统和修正函数计算信息安全风险传播的可能性。最后,基于质量因子的思想给出关键事件损失量化模型。通过定量评估关键事件的风险值,能进一步在化工厂仿真环境中验证所提方法的有效性。
Industrial control system (ICS) is related to the normal operation of national key infrastructure. With the increase of system openness
industrial control systems are facing dual risks in the cyber domain and the physical domain. It was no longer applicable to only conduct risk assessment on one aspect of safety or security. A risk assessment method for the security integration of industrial control systems was proposed to address this. In the process of quantitative risk assessment for security integration
risk propagation path analysis
calculation of the likelihood of risk propagation paths
and quantification of the loss value of security risks are the key elements that affect the accuracy of the assessment. Firstly
the method combined the respective advantages of Petri Net and the bow-tie model to analyze both security risk propagation paths
safety risk propagation paths
and risk cross-domain propagation paths. Then
the expert knowledge
trigonometric fuzzy number and centroid formula was used to calculate the possibility of safety risk propagation
and the probability of information security risk propagation was calculated based on the vulnerability scoring system and correction function. Finally
based on the idea of mass factor
a quantitative model of key event loss was given. By quantitatively assessing the risk value of critical events
the effectiveness of the proposed methodology can be further validated in a chemical plant simulation environment.
KRIAA S , PIETRE-CAMBACEDES L , BOUISSOU M , et al . A survey of approaches combining safety and security for industrial control systems [J ] . Reliability Engineering & System Safety , 2015 , 139 : 156 - 178 .
Gaithersburg: National Institute of Standards and Technology (NIST). Guide to industrial control system (ICS) security: NIST SP800-82 [S ] . 2014 .
ABDO H , KAOUK M , FLAUS J M , et al . A safety/security risk analysis approach of industrial control systems: a cyber bowtie-combining new version of attack tree with bowtie analysis [J ] . Computers & Security , 2018 , 72 : 175 - 195 .
HUANG K X , ZHOU C J , TIAN Y C , et al . Assessing the physical impact of cyberattacks on industrial cyber-physical systems [J ] . IEEE Transactions on Industrial Electronics , 2018 , 65 ( 10 ): 8153 - 8162 .
DENG S , ZHANG J T , WU D , et al . A quantitative risk assessment model for distribution cyber-physical system under cyberattack [J ] . IEEE Transactions on Industrial Informatics , 2023 , 19 ( 3 ): 2899 - 2908 .
ZHANG Q , ZHOU C J , XIONG N X , et al . Multimodel-based incident prediction and risk assessment in dynamic cybersecurity protection for industrial control systems [J ] . IEEE Transactions on Systems, Man, and Cybernetics: Systems , 2016 , 46 ( 10 ): 1429 - 1444 .
ZHANG Q , ZHOU C J , TIAN Y C , et al . A fuzzy probability Bayesian network approach for dynamic cybersecurity risk assessment in industrial control systems [J ] . IEEE Transactions on Industrial Informatics , 2018 , 14 ( 6 ): 2497 - 2506 .
AMRO A , GKIOULOS V , KATSIKAS S . Assessing cyber risk in cyber-physical systems using the ATT&CK framework [J ] . ACM Transactions on Privacy and Security , 2023 , 26 ( 2 ): 1 - 33 .
WANG Y M , WANG W H , BAI X X , et al . RRDD: an ATT&CK-based ICS network security risk assessment method [C ] // Proceedings of the 2023 2nd International Conference on Networks, Communications and Information Technology . New York : ACM Press , 2023 : 186 - 192 .
LIU K X , XIE Y F , XIE S W , et al . SEAG: a novel dynamic security risk assessment method for industrial control systems with consideration of social engineering [J ] . Journal of Process Control , 2023 , 132 : 103131 .
BI J C , YANG X F , WU Y B , et al . On the optimal dynamic control strategy of disruptive computer virus [J ] . Discrete Dynamics in Nature and Society , 2017 : 1 - 14 .
KUMARI S , UPADHYAY R K . Exploring the behavior of malware propagation on mobile wireless sensor networks: stability and control analysis [J ] . Mathematics and Computers in Simulation , 2021 , 190 : 246 - 269 .
ZHU Q Y , ZHANG G , LUO X H , et al . An industrial virus propagation model based on SCADA system [J ] . Information Sciences , 2023 , 630 : 546 - 566 .
KABIR S , PAPADOPOULOS Y . Applications of Bayesian networks and Petri nets in safety, reliability, and risk assessments: a review [J ] . Safety Science , 2019 , 115 : 154 - 175 .
PASANDIDEH S , GOMES L , MALO P . Improving attack trees analysis using Petri net modeling of cyber-attacks [C ] // Proceedings of the 2019 IEEE 28th International Symposium on Industrial Electronics (ISIE) . Piscataway : IEEE Press , 2019 : 1644 - 1649 .
姜文淇 . 基于改进Petri网的工业机器人系统风险评估方法研究 [D ] . 哈尔滨 : 哈尔滨工业大学 , 2021 .
JIANG W Q . Research on risk assessment method of industrial robot system based on improved Petri net [D ] . Harbin : Harbin Institute of Technology , 2021 .
FLAMMINI F , GENTILE U , MARRONE S , et al . A Petri net pattern-oriented approach for the design of physical protection systems [C ] // Computer Safety, Reliability, and Security . Cham : Springer International Publishing , 2014 : 230 - 245 .
DUIJM N J . Safety-barrier diagrams as a safety management tool [J ] . Reliability Engineering & System Safety , 2009 , 94 ( 2 ): 332 - 341 .
BADREDDINE A , BEN ROMDHANE T , BEN HAJKACEM M A , et al . A new multi-objectives approach to implement preventive and protective barriers in bow tie diagram [J ] . Journal of Loss Prevention in the Process Industries , 2014 , 32 : 238 - 253 .
FERDOUS R , KHAN F , SADIQ R , et al . Handling and updating uncertain information in bow-tie analysis [J ] . Journal of Loss Prevention in the Process Industries , 2012 , 25 ( 1 ): 8 - 19 .
IEC/ SC 65A. IEC EN 61508-2010 : Functional safety of electrical/electronic/programmable electronic safety-related systems [S ] . IEC : IEC , 2010 .
马叶桐 , 丁云杰 , 刘圃卓 , 等 . 工业控制系统功能安全和信息安全一体化风险评估方法 [J ] . 信息安全学报 , 2021 .
MA Y T , DING Y J , LIU P Z , et al . Integrated risk assessment algorithm for functional safety and information security of industrial control systems [J ] . Journal of Cyber Security . 2021 .
LYU X R , DING Y L , YANG S H . Safety and security risk assessment in cyber-physical systems [J ] . IET Cyber-Physical Systems: Theory & Applications , 2019 , 4 ( 3 ): 221 - 232 .
ONISAWA T . An approach to human reliability in man-machine systems using error possibility [J ] . Fuzzy Sets and Systems , 1988 , 27 ( 2 ): 87 - 103 .
BADIDA P , BALASUBRAMANIAM Y , JAYAPRAKASH J . Risk evaluation of oil and natural gas pipelines due to natural hazards using fuzzy fault tree analysis [J ] . Journal of Natural Gas Science and Engineering , 2019 , 66 : 284 - 292 .
Forum of Incident Response and Security Teams . Common vulnerability scoring system version 3.1: specification document [R ] . 2021 .
MUÑOZ-GONZÁLEZ L , SGANDURRA D , BARRÈRE M , et al . Exact inference techniques for the analysis of Bayesian attack graphs [J ] . IEEE Transactions on Dependable and Secure Computing , 2019 , 16 ( 2 ): 231 - 244 .
FORMBY D , RAD M , BEYAH R . Lowring the barriers to industrial control system security with GRFICS [C ] // Proceedings of USENIX Workshop on Advances in Security Education (ASE) . 2018 .
RICKER N L . Model predictive control of a continuous, nonlinear, two-phase reactor [J ] . Journal of Process Control , 1993 ( 3 ): 109 - 123 .
ALVARO A , CÁRDENAS , AMIN S , et al . Attacks against process control systems: risk assessment, detection, and response [C ] // Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security(ASIACCS’ 11) . New York : ACM Press , 2011 : 355 - 366 . doi: 10.1145/1966913.1966959 http://dx.doi.org/10.1145/1966913.1966959 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构