为解决卷接设备IPC控制系统因内部缺失防护措施而存在安全隐患等问题,通过分析IPC(Industrial Personal Computer)控制系统的安全漏洞和攻击路径,采用构建控制系统典型攻击链模型的方法,设计了系统网伪控制指令安全监测、IPC控制器非侵...为解决卷接设备IPC控制系统因内部缺失防护措施而存在安全隐患等问题,通过分析IPC(Industrial Personal Computer)控制系统的安全漏洞和攻击路径,采用构建控制系统典型攻击链模型的方法,设计了系统网伪控制指令安全监测、IPC控制器非侵入式安全监测、控制网异常控制行为安全监测3个安全监测模块,结合数据无扰采集和安全风险预警技术,构建了能够覆盖卷接设备核心控制设备和通信网络的A3MA(Acquisition-Monitoring-Monitoring-Monitoring-Alarm)安全监测模型。以ZJ17E卷接机组的IPC控制系统为对象进行测试,结果表明:A3MA安全监测模型能够快速发现系统网伪控制指令行为,快速定位针对IPC控制器的未授权篡改行为,快速识别EtherCAT控制网的异常控制行为。该模型可为实现卷接设备IPC控制系统的多层安全监测提供技术支持。展开更多
According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the...According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the shortest-tangent idea in route-planning and the algorithm of back reasoning from targets,a reference route algorithm is built on the shortest range and threat avoidance.Then a route-flight-time algorithm is built on navigation points.Based on the conditions of multi-direction saturation attack,a route planning algorithm of multi-direction saturation attack is built on reference route,route-flight-time,and impact azimuth.Simulation results show that the algorithm can realize missiles fired in a salvo launch reaching the target simultaneously from different directions while avoiding threat.展开更多
LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is...LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect.展开更多
文摘为解决卷接设备IPC控制系统因内部缺失防护措施而存在安全隐患等问题,通过分析IPC(Industrial Personal Computer)控制系统的安全漏洞和攻击路径,采用构建控制系统典型攻击链模型的方法,设计了系统网伪控制指令安全监测、IPC控制器非侵入式安全监测、控制网异常控制行为安全监测3个安全监测模块,结合数据无扰采集和安全风险预警技术,构建了能够覆盖卷接设备核心控制设备和通信网络的A3MA(Acquisition-Monitoring-Monitoring-Monitoring-Alarm)安全监测模型。以ZJ17E卷接机组的IPC控制系统为对象进行测试,结果表明:A3MA安全监测模型能够快速发现系统网伪控制指令行为,快速定位针对IPC控制器的未授权篡改行为,快速识别EtherCAT控制网的异常控制行为。该模型可为实现卷接设备IPC控制系统的多层安全监测提供技术支持。
基金supported by the Aeronautical Science Foundation of China (20085584010)
文摘According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the shortest-tangent idea in route-planning and the algorithm of back reasoning from targets,a reference route algorithm is built on the shortest range and threat avoidance.Then a route-flight-time algorithm is built on navigation points.Based on the conditions of multi-direction saturation attack,a route planning algorithm of multi-direction saturation attack is built on reference route,route-flight-time,and impact azimuth.Simulation results show that the algorithm can realize missiles fired in a salvo launch reaching the target simultaneously from different directions while avoiding threat.
文摘LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect.