期刊文献+

核电厂数字化仪表控制系统网络安全风险分析方法综述 被引量:4

Review on Cyber Security Risk Analysis Methods for NPP Digital Instrument and Control Systems
下载PDF
导出
摘要 目前,核电厂已经广泛采用基于网络和软件的数字化仪表和控制系统(简称“仪控系统”)。数字化仪控系统作为核电厂的神经中枢,一旦遭受网络攻击,将对核电厂的安全性、可用性造成风险。因此,应采用适当的方法对核电厂数字化仪控系统的网络安全风险进行分析评估,以进一步提高核电厂数字化仪控系统防范风险的能力。首先,将网络安全风险分析方法分为基于公式的方法、基于非图形模型的方法、基于图形模型的方法这三类进行文献综述;然后,从动态分析、风险量化、数据来源、核安全与网络安全四个方面进行了适用性分析。该研究为核电厂数字化仪控系统选择适当的网络安全风险分析方法提供了参考。 Nowadays,digital instrument and control systems based on networks and software(referred to as“I&C systems”)are widely adopted in the nuclear power plants.As the central nervous systems of a nuclear power plant,the digital I&C system will cause risks to the safety and availability of the nuclear power plant once it suffers cyber attacks.Therefore,appropriate analysis methods should be used to analyze and evaluate the cyber security risks to further improve the ability of the digital I&C systems of the nuclear power plant to prevent risks.Finstly,the cyber security risk analysis methods are devided into three categories:formula-based methods,non-graphical model-based methods,and graphical model-based methods for literature review.Then,the applicability analysis is carried out from four aspects:dynamic analysis,risk quantification,data sources,nuclear safety and cyber security.The research provides a reference for choosing an appropriate cyber security risk analysis method for the digital I&C systems of nuclear power plants.
作者 黄晓津 田宇琨 李江海 HUANG Xiaojin;TIAN Yukun;LI Jianghai(Institute of Nuclear and New Energy Technology,Tsinghua University,Beijing 100084,China;Key Laboratory of Advanced Reactor Engineering and Safety of Ministry of Education,Beijing 100084,China)
出处 《自动化仪表》 CAS 2022年第5期1-7,共7页 Process Automation Instrumentation
关键词 核电厂 数字化仪表与控制系统 信息物理系统 网络安全 风险分析 网络安全标准 Nuclear power plant Digital instrument and control system Cyber physical system(CPS) Cyber security Risk analysis Cyber security standard
  • 相关文献

参考文献3

二级参考文献20

  • 1BYRES E, LOWE J. The myths and facts be- hind cyber security risks for industrial control systems[C]//Proceedings of the VDE Kongress. Berlin, Germany: [s. n. ], 2004. 被引量:1
  • 2BYRES E, LEVERSAGE D. The industrial se- curity incident database[R]. Wurldtech Analyt- ics Inc. , 2006. 被引量:1
  • 3CNN. Mouse click could plunge city into dark ness, experts say[EB/OL]. (2007-09 27). http ///edition. cnn. eom/2007/US/O9/27/power, at. risk/index, html. 被引量:1
  • 4KREBS B. Cyber incident blamed for nuclear power plant shutdown [N]. The Washington Post, 2008-06-05. 被引量:1
  • 5Government of Canada P S C. AV10-023: Sie- mens SIMATIC WinCC or Siemens Step 7 sot- ware vulnerabilities[EB/OL]. (2011 10-22). ht- tp // www. publicsafety, gc. ca/prg/em/ceirc/ 2010/av10-023-eng. aspx. 被引量:1
  • 6ERDBRINK T, NAKASHIMA E. Iran strugg- ling to contain "foreign-made" "Stuxnet" com- puter virus[N]. The Washington Post, 2010-09- 27. 被引量:1
  • 7ALBRIGHT D, BRANNAN P, WALROND C. Did Stuxnet take out 1,000 centrifuges at the Na- tanz enrichment plant? [R]. USA: Institute for Science and International Security, 2010. 被引量:1
  • 8工业和信息化部.关于加强工业控制系统信息安全管理的通知[EB/OL].(2011-10-27).http:// xxaqs, miit. gov. cn/n11293472/n11295344/ n13012971/14291899, html. 被引量:1
  • 9PERLROTH N. Researchers link {lame virus to Stuxnet and Duqu[N]. The New York Times, 2012-05-30. 被引量:1
  • 10STOUFFER K, FALCO J, SCARFONE K. Guide to industrial control systems (ICS) securi- ty, NIST-SP-800-82-2011 [R]. USA: National Institute of Standards and Technology, 2011. 被引量:1

共引文献23

同被引文献27

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部