计算机应用 ›› 2018, Vol. 38 ›› Issue (6): 1608-1613.DOI: 10.11772/j.issn.1001-9081.2017112703

• 网络空间安全 • 上一篇    下一篇

新型工业控制系统勒索蠕虫威胁与防御

刘煜堃1, 诸葛建伟1, 吴一雄1,2   

  1. 1. 清华大学 网络科学与网络空间研究院, 北京 100084;
    2. 福州大学 数学与计算机科学学院, 福州 350116
  • 收稿日期:2017-11-15 修回日期:2018-02-23 出版日期:2018-06-10 发布日期:2018-06-13
  • 通讯作者: 诸葛建伟
  • 作者简介:刘煜堃(1993-),男,福建福州人,硕士研究生,主要研究方向:系统安全、漏洞挖掘、漏洞利用、工业控制系统安全;诸葛建伟(1980-),男,浙江瑞安人,副研究员,博士,CCF高级会员,主要研究方向:系统安全、网络攻防;吴一雄(1995-),男,福建莆田人,主要研究方向:Web应用安全、工业控制系统安全。
  • 基金资助:
    国家自然科学基金资助项目(61472209);清华大学国际科技合作项目(20163000227);清华大学自主科研计划课题(20151080436)。

Threat and defense of new ransomware worm in industrial control system

LIU Yukun1, ZHUGE Jianwei1, WU Yixiong1,2   

  1. 1. Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China;
    2. College of Mathematics and Computer Science, Fuzhou University, Fuzhou Fujian 350116, China
  • Received:2017-11-15 Revised:2018-02-23 Online:2018-06-10 Published:2018-06-13
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (61472209), the International Science and Technology Cooperation Project of Tsinghua University (20163000227), the Independent Research Project of Tsinghua University (20151080436).

摘要: 工业控制系统(ICS)的大规模攻击对于电力生产、输配电、石油化工、水处理和传输等涉及国计民生的关键基础设施是一个巨大的威胁,目前提出的针对ICS的勒索蠕虫受限于工控网络隔离的特性,难以大规模传播。基于观察到的ICS实际开发场景,针对ICS高度隔离化的问题,提出一种基于新的攻击路径的勒索蠕虫威胁模型。此威胁模型首先将工程师站作为初次感染目标,然后以工程师站作为跳板,对处于内部网络的工业控制设备进行攻击,最后实现蠕虫式感染和勒索。基于此威胁模型,实现了ICSGhost——一种勒索蠕虫原型。在封闭的实验环境中,ICSGhost能够以预设的攻击路径对ICS进行蠕虫式感染;同时,针对该勒索蠕虫威胁,讨论了防御方案。实验结果表明此种威胁切实存在,并且由于其传播路径基于ICS实际的开发场景,较难检测和防范。

关键词: 工业控制系统, 蠕虫, 勒索软件, 网络犯罪, 安全威胁

Abstract: Industrial Control System (ICS) is widely used in critical infrastructure projects related to the national economy and people's livelihood such as power generation, transmission and distribution, petrochemical industry, water treatment and transmission. Large-scale attack on ICS is a huge threat to critical infrastructure. At present, the proposed ransomware worm for ICS is limited by the isolation characteristics of industrial control network, and it is difficult to spread on a large scale. Based on the observed actual development scene of ICS, in order to solve the problem of high isolation for ICS, a novel ransomware worm threat model with a new attack path was proposed. Firstly, the engineer station was taken as the primary infection target. Then, the engineer station was used as the springboard to attack the industrial control devices in the internal network. Finally, the worm infection and ransom were realized. Based on the proposed threat model, ICSGhost, which was a ransomware worm prototype, was implemented. In the closed experimental environment, ICSGhost can realize worm infection for ICS with a predetermined attack path. At the same time, for the ransomware worm threat, the defense plan was discussed. The experimental results show that such threat exists, and because its propagation path is based on the actual development scene of ICS, it is difficult to detect and guard against.

Key words: Industrial Control System (ICS), worm, ransomware, cybercrime, security threat

中图分类号: