《计算机应用》唯一官方网站 ›› 2025, Vol. 45 ›› Issue (5): 1548-1555.DOI: 10.11772/j.issn.1001-9081.2024050579

• 网络空间安全 • 上一篇    

云边协同工业控制系统跨域攻击评估

林陈威, 陈平()   

  1. 复旦大学 大数据研究院,上海 200433
  • 收稿日期:2024-05-10 修回日期:2024-10-08 接受日期:2025-02-11 发布日期:2025-02-14 出版日期:2025-05-10
  • 通讯作者: 陈平
  • 作者简介:林陈威(1999—),男,福建福州人,博士研究生,主要研究方向:网络安全
    陈平(1985—),男,江苏南京人,教授,博士,主要研究方向:软件和系统安全、内生安全。
  • 基金资助:
    国家重点研发计划项目(2022YFB3102800)

Evaluation of cross-domain attacks in cloud-edge collaborative industrial control systems

Chenwei LIN, Ping CHEN()   

  1. Institute of Big Data,Fudan University,Shanghai 200433,China
  • Received:2024-05-10 Revised:2024-10-08 Accepted:2025-02-11 Online:2025-02-14 Published:2025-05-10
  • Contact: Ping CHEN
  • About author:LIN Chenwei, born in 1999, Ph. D. candidate. His research interests include cyber security.
    CHEN Ping, born in 1985, Ph. D., professor. His research interests include software and system security, endogenous security.
  • Supported by:
    National Key Research and Development Program of China(2022YFB3102800)

摘要:

针对工业控制系统(ICS)结构日益复杂,尤其是在云边协同计算的背景下,系统面临的网络安全风险显著增加的挑战,提出一个针对云边协同场景下ICS跨域攻击的评估框架,系统性地识别、评估和防御潜在的安全威胁。首先,详细收集并分类ICS中的资产、跨域攻击入口、跨域攻击方式和跨域攻击影响,建立评估框架的基础数据和结构。其次,基于ICS的特点,从系统模块、攻击路径、攻击方法及其潜在影响4个维度构建一套全新的跨域攻击评估指标体系。与现有方法相比,该指标体系能够实时响应系统动态变化,提供更细致的跨域攻击量化分析。此外,在模拟ICS环境中进行仿真实验,测试了评估框架的实际效果,并验证了该框架能有效地识别系统的薄弱区域,提升系统整体的安全性。结果表明,该评估框架能够为工业环境中云边协同技术的安全应用提供理论和实践指导,具有较好的应用前景。

关键词: 工业控制系统, 云边协同, 跨域攻击, 攻击评估, 网络安全

Abstract:

In response to the increasing complexity of Industrial Control System (ICS) structure, especially within the context of cloud-edge collaborative computing, which significantly raises cybersecurity risks, an evaluation framework specifically for assessing cross-domain attacks in cloud-edge collaborative scenarios was proposed to identify, evaluate, and defense against potential security threats systematically. Initially, this framework entailed a thorough collection and categorization of ICS assets, cross-domain attack entrances, methods, and impacts, establishing a foundational database and structure for assessment. Furthermore, based on the characteristics of ICS, a novel set of evaluation indicators for cross-domain attacks was developed, encompassing system modules, attack paths, attack methods, and potential impacts. Additionally, through simulation experiments conducted in a simulated ICS environment, the effectiveness of this evaluation framework was tested, verifying its capacity to effectively identify vulnerabilities within the system and enhance overall security. The results demonstrate that the assessment framework can provide both theoretical and practical guidance for the secure application of cloud-edge technologies in industrial settings, indicating promising applicability.

Key words: Industrial Control System (ICS), cloud-edge collaboration, cross-domain attack, attack evaluation, cybersecurity

中图分类号: