基于分层智能控制系统的信息安全技术研究

Hainie Meng, Yunli Cheng, Xiaoru Chen, Qiaoxian Lai, Yaohua Lei
{"title":"基于分层智能控制系统的信息安全技术研究","authors":"Hainie Meng, Yunli Cheng, Xiaoru Chen, Qiaoxian Lai, Yaohua Lei","doi":"10.1109/CBFD52659.2021.00030","DOIUrl":null,"url":null,"abstract":"With the advent of the information age, the field of industrial control has achieved rapid development. Industrial equipment is connected to each other through bus network, and the deployment is relatively dispersed. Due to the lack of sufficient security of bus protocol, intruders use the information security hidden danger of bus protocol to attack the system. Therefore, the research on information security of fieldbus protocol is of great significance for information security protection in industrial field. In this paper, starting from the theory and practice, the commonly used several kinds of fieldbus in the industrial control system, namely the Modbus/RTU, CAN, Mr CAT bus research and analysis. Firstly, the Petri net formalized modeling method was used to model and analyze the above bus respectively. Secondly, the accessibility analysis method was used to analyze and verify the boundedness, reversibility and initiative of the model. Finally, the correctness of the model was guaranteed. Aiming at the hidden trouble existing in the current bus protocol, the attack behavior is formally described by Petri net model. In the experiment part, Modbus/RTU, CAN and Ether CAT field buses are used to build a hierarchical intelligent control system to simulate the actual industrial control scene. The system is divided into decision layer, control layer and executive layer to realize the communication between each layer and the upper and lower layers. In order to simulate the behavior of attackers, several attack experiments were carried out, including flood attack, eavesdropping to steal data frames, man-in-the-middle attack and other attack methods, to disrupt the normal operation of the system and record the experimental results. Finally, a bus monitoring system is designed, taking CAN bus as the monitoring object. The system CAN conduct real-time monitoring of the state when CAN bus transmits data according to the flow of data frames, and meanwhile conduct data collection to identify illegal data frames, so as to realize information security protection of the control system to a certain extent.The focus of this paper is to use Petri net modeling analysis method to analyze and study several field buses, and through the attack experiment to analyze the bus system information security risks, hoping that the research content of this paper can provide theoretical reference for the design and security protection of industrial control system.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on information security technology based on hierarchical intelligent control system\",\"authors\":\"Hainie Meng, Yunli Cheng, Xiaoru Chen, Qiaoxian Lai, Yaohua Lei\",\"doi\":\"10.1109/CBFD52659.2021.00030\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the advent of the information age, the field of industrial control has achieved rapid development. Industrial equipment is connected to each other through bus network, and the deployment is relatively dispersed. Due to the lack of sufficient security of bus protocol, intruders use the information security hidden danger of bus protocol to attack the system. Therefore, the research on information security of fieldbus protocol is of great significance for information security protection in industrial field. In this paper, starting from the theory and practice, the commonly used several kinds of fieldbus in the industrial control system, namely the Modbus/RTU, CAN, Mr CAT bus research and analysis. Firstly, the Petri net formalized modeling method was used to model and analyze the above bus respectively. Secondly, the accessibility analysis method was used to analyze and verify the boundedness, reversibility and initiative of the model. Finally, the correctness of the model was guaranteed. Aiming at the hidden trouble existing in the current bus protocol, the attack behavior is formally described by Petri net model. In the experiment part, Modbus/RTU, CAN and Ether CAT field buses are used to build a hierarchical intelligent control system to simulate the actual industrial control scene. The system is divided into decision layer, control layer and executive layer to realize the communication between each layer and the upper and lower layers. In order to simulate the behavior of attackers, several attack experiments were carried out, including flood attack, eavesdropping to steal data frames, man-in-the-middle attack and other attack methods, to disrupt the normal operation of the system and record the experimental results. Finally, a bus monitoring system is designed, taking CAN bus as the monitoring object. The system CAN conduct real-time monitoring of the state when CAN bus transmits data according to the flow of data frames, and meanwhile conduct data collection to identify illegal data frames, so as to realize information security protection of the control system to a certain extent.The focus of this paper is to use Petri net modeling analysis method to analyze and study several field buses, and through the attack experiment to analyze the bus system information security risks, hoping that the research content of this paper can provide theoretical reference for the design and security protection of industrial control system.\",\"PeriodicalId\":230625,\"journal\":{\"name\":\"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CBFD52659.2021.00030\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CBFD52659.2021.00030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着信息时代的到来,工业控制领域得到了飞速的发展。工业设备通过总线网络相互连接,部署相对分散。由于总线协议缺乏足够的安全性,入侵者利用总线协议的信息安全隐患对系统进行攻击。因此,研究现场总线协议的信息安全对于工业领域的信息安全保护具有重要意义。本文从理论和实践出发,对工业控制系统中常用的几种现场总线,即Modbus/RTU、CAN、Mr CAT总线进行了研究和分析。首先,采用Petri网形式化建模方法对上述总线分别进行建模和分析。其次,采用可达性分析方法对模型的有界性、可逆性和主动性进行了分析和验证。最后,保证了模型的正确性。针对当前总线协议存在的隐患,采用Petri网模型对攻击行为进行形式化描述。在实验部分,采用Modbus/RTU、CAN和Ether CAT现场总线,构建了一个分层智能控制系统,模拟实际工业控制场景。系统分为决策层、控制层和执行层,实现各层与上下级之间的通信。为了模拟攻击者的行为,进行了多次攻击实验,包括洪水攻击、窃听窃取数据帧、中间人攻击等攻击方式,破坏系统的正常运行,并记录实验结果。最后,设计了以CAN总线为监控对象的总线监控系统。系统可以根据数据帧的流向对CAN总线传输数据时的状态进行实时监控,同时进行数据采集,识别非法数据帧,从而在一定程度上实现对控制系统的信息安全保护。本文的重点是利用Petri网建模分析方法对几种现场总线进行分析研究,并通过攻击实验对总线系统信息安全风险进行分析,希望本文的研究内容能够为工控系统的设计和安全防护提供理论参考。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Research on information security technology based on hierarchical intelligent control system
With the advent of the information age, the field of industrial control has achieved rapid development. Industrial equipment is connected to each other through bus network, and the deployment is relatively dispersed. Due to the lack of sufficient security of bus protocol, intruders use the information security hidden danger of bus protocol to attack the system. Therefore, the research on information security of fieldbus protocol is of great significance for information security protection in industrial field. In this paper, starting from the theory and practice, the commonly used several kinds of fieldbus in the industrial control system, namely the Modbus/RTU, CAN, Mr CAT bus research and analysis. Firstly, the Petri net formalized modeling method was used to model and analyze the above bus respectively. Secondly, the accessibility analysis method was used to analyze and verify the boundedness, reversibility and initiative of the model. Finally, the correctness of the model was guaranteed. Aiming at the hidden trouble existing in the current bus protocol, the attack behavior is formally described by Petri net model. In the experiment part, Modbus/RTU, CAN and Ether CAT field buses are used to build a hierarchical intelligent control system to simulate the actual industrial control scene. The system is divided into decision layer, control layer and executive layer to realize the communication between each layer and the upper and lower layers. In order to simulate the behavior of attackers, several attack experiments were carried out, including flood attack, eavesdropping to steal data frames, man-in-the-middle attack and other attack methods, to disrupt the normal operation of the system and record the experimental results. Finally, a bus monitoring system is designed, taking CAN bus as the monitoring object. The system CAN conduct real-time monitoring of the state when CAN bus transmits data according to the flow of data frames, and meanwhile conduct data collection to identify illegal data frames, so as to realize information security protection of the control system to a certain extent.The focus of this paper is to use Petri net modeling analysis method to analyze and study several field buses, and through the attack experiment to analyze the bus system information security risks, hoping that the research content of this paper can provide theoretical reference for the design and security protection of industrial control system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信