《计算机应用》唯一官方网站 ›› 2023, Vol. 43 ›› Issue (6): 1861-1869.DOI: 10.11772/j.issn.1001-9081.2022050914

• 网络空间安全 • 上一篇    下一篇

可编程逻辑控制器的控制逻辑注入攻击入侵检测方法

孙怡亭1,2, 郭越3(), 李长进3, 张红军3, 刘康4, 刘俊矫1,2, 孙利民1,2   

  1. 1.物联网信息安全技术北京市重点实验室(中国科学院信息工程研究所), 北京 100093
    2.中国科学院大学 网络空间安全学院, 北京 100049
    3.河南中烟工业有限责任公司 许昌卷烟厂, 河南 许昌 461000
    4.河南新拓途信息技术有限公司, 郑州 450000
  • 收稿日期:2022-06-27 修回日期:2022-08-10 接受日期:2022-08-11 发布日期:2022-09-23 出版日期:2023-06-10
  • 通讯作者: 郭越
  • 作者简介:孙怡亭(1996—),女,甘肃白银人,硕士研究生,主要研究方向:工控安全
    郭越(1976—),男,河南长垣人,工程师,主要研究方向:设备管理Email:907279615@qq.com
    李长进(1972—),男,河南许昌人,工程师,主要研究方向:烟草行业制丝设备及工艺
    张红军(1974—),男,河南许昌人,工程师,主要研究方向:烟草行业制丝设备及工艺
    刘康(1991—),男,河南新乡人,主要研究方向:烟草行业通信管理
    刘俊矫(1992—),男,山东烟台人,博士研究生,主要研究方向:工控安全
    孙利民(1966—),男,北京人,教授,博士,主要研究方向:工控安全。
  • 基金资助:
    国家自然科学基金资助项目(61702506)

Intrusion detection method for control logic injection attack against programmable logic controller

Yiting SUN1,2, Yue GUO3(), Changjin LI3, Hongjun ZHANG3, Kang LIU4, Junjiao Liu1,2, Limin SUN1,2   

  1. 1.Beijing Key Laboratory of IOT Information Security Technology (Institute of Information Engineering,Chinese Academy of Sciences),Beijing 100093,China
    2.School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
    3.Xuchang Cigarette Factory,Henan Zhongyan Industry Company Limited,Xuchang Henan 461000,China
    4.Henan Xintuotu Information Technology Company Limited,Zhengzhou Henan 450000,China
  • Received:2022-06-27 Revised:2022-08-10 Accepted:2022-08-11 Online:2022-09-23 Published:2023-06-10
  • Contact: Yue GUO
  • About author:SUN Yiting, born in 1996, M. S. candidate. Her research interests include industrial control security.
    LI Changjin, born in 1972, engineer. His research interests include silk making equipment and technology in tobacco industry.
    ZHANG Hongjun, born in 1974, engineer. His research interests include silk making equipment and technology in tobacco industry.
    LIU Kang, born in 1991. His research interests include communication management in tobacco industry.
    LIU Junjiao, born in 1992, Ph. D. candidate. His research interests include industrial control security.
    SUN Limin, born in 1966, Ph. D., professor. His research interests include industrial control security.
  • Supported by:
    National Natural Science Foundation of China(61702506)

摘要:

可编程逻辑控制器(PLC)的控制逻辑注入攻击通过篡改控制程序操纵物理过程,从而达到影响控制过程或破坏物理设施的目的。针对PLC控制逻辑注入攻击,提出了一种基于白名单规则自动化生成的入侵检测方法PLCShield (Programmable Logic Controller Shield)。所提方法以PLC控制程序承载着全面、完整的物理过程控制信息为依据,主要包括两个阶段:首先,通过分析PLC程序的配置文件、指令功能、变量属性和执行路径等信息,提取程序属性、地址、值域和结构等检测规则;其次,采用主动请求PLC的运行“快照”和被动监听网络流量结合的方式,实时获取PLC当前的运行状态和流量中的操作、状态等信息,并通过对比得到的信息与检测规则识别攻击行为。以4款不同厂商和型号的PLC作为研究案例验证PLCShield的可行性,实验结果表明所提方法的攻击检测准确度达到97.71%以上,验证了所提方法的有效性。

关键词: 可编程逻辑控制器, 控制逻辑, 注入攻击, 白名单机制, 攻击检测

Abstract:

Control logic injection attack against Programmable Logic Controller (PLC) manipulate the physical process by tampering with the control program, thereby achieving the purpose of affecting the control process or destroying the physical facilities. Aiming at PLC control logic injection attacks, an intrusion detection method based on automatic whitelist rules generation was proposed, called PLCShield (Programmable Logic Controller Shield). Based on the fact that PLC control program carries comprehensive and complete physical process control information, the proposed method mainly includes two stages: firstly, by analyzing the PLC program’s configuration file, instruction function, variable attribute, execution path and other information, the detection rules such as program attribute, address, value range and structure were extracted; secondly, combining actively requesting a “snapshot” of the PLC’s running and passively monitoring network traffic was used to obtain real-time information such as the current running status of PLC and the operation and status in the traffic, and the attack behavior was identified by comparing the obtained information with the detection rules. Four PLCs of different manufacturers and models were used as research cases to verify the feasibility of PLCShield. Experimental results show that the attack detection accuracy of the proposed method can reach more than 97.71%. The above prove that the proposed method is effective.

Key words: Programmable Logic Controller (PLC), control logic, injection attack, whitelist mechanism, attack detection

中图分类号: