发电厂DCS网络安全评估与防护Network Security Evaluation and Protection of DCS in Power Plant
蔡钧宇,苏烨,尹峰,陈波
CAI Junyu,SU Ye,YIN Feng,CHEN Bo
摘要(Abstract):
针对发电厂DCS(分散控制系统)信息安全评估项目,提出了基于在线资产发现与核心设备自定义测试例漏洞检测相融合的安全评估方法。在线资产发现目的是实现动态DCS网络架构的生成和发现潜在静默设备甚至非法联网设备;核心设备的漏洞扫描旨在发现设备之间通信的安全漏洞,特别是常规测试无法检测到的隐患。检测发现发电厂DCS网络存在不同严重程度的安全漏洞,在自定义测试中还发现了控制器在通信过程中缺乏认证机制的缺陷,检测结果验证了所提安全评估方法是有效的。
Aiming at the information security assessment project of DCS(distributed control system) in power plant, this paper proposes a security assessment method based on the integration of online asset discovery and core equipment customization test case vulnerability detection. The purpose of online asset discovery is to realize the generation of dynamic DCS network architecture and to find potential silent devices or even illegal networking devices; the vulnerability scanning of core devices aims to find security vulnerabilities in communication between devices, especially hidden dangers that cannot be detected by conventional testing. It is found that there are security vulnerabilities of various levels in the DCS network of the power plant. In the customized test, it is also found that the controller lacks authentication mechanism in the communication process. The test results verify the effectiveness of the security evaluation method proposed in this paper.
关键词(KeyWords):
分散控制系统;安全评估;在线资产发现;漏洞扫描;自定义测试例
distributed control system(DCS);security assessment;online asset discovery;vulnerability scan;customized test case
基金项目(Foundation): 国网浙江省电力有限公司科技项目(5211DS17000Z)
作者(Author):
蔡钧宇,苏烨,尹峰,陈波
CAI Junyu,SU Ye,YIN Feng,CHEN Bo
DOI: 10.19585/j.zjdl.201911018
参考文献(References):
- [1]丁俊宏,丁宁,苏烨,等.2015年浙江省发电厂典型热控故障异常分析与建议[J].浙江电力,2017,36(1):27-30.
- [2]工业自动化和控制系统网络安全集散控制系统(DCS)第3部分:评估指南:GB/T 33009.3—2016[S].北京:中国标准出版社,2016.
- [3]赵孟,谭玉波.网络安全评估技术综述[J].计算机科学与应用,2015,5(1):18-24.
- [4]袁胜.工业控制系统被谁“反控”[J].中国信息安全,2016,31(4):46-47.
- [5]敖琪,张根宝.基于马尔科夫的多路控制器可靠性及安全评估[J].自动化仪表,2014,35(3):60-63.
- [6]王孝良,崔保红,李思其.关于工控系统信息安全的思考与建议[J].信息网络安全,2012(8):36-37.
- [7]王宸东,郭渊博,甄帅辉,等.网络资产探测技术研究[J].计算机科学,2018,45(12):42-48.
- [8]陈靖,王冬海,彭武.基于动态攻击图的网络安全实时评估[J].计算机科学,2013,40(2):133-138.
- [9]陈小军,方滨兴,谭庆丰,等.基于概率攻击图的内部攻击意图推断算法研究[J].计算机学报,2014,37(1):62-72.
- [10]陆悠,李伟,罗军,等.一种基于选择性协同学习的网络用户异常行为检测方法[J].计算机学报,2014,37(1):28-40.
- [11]张静媛,黄丹丹,杨晓彦,等.NESSUS基本原理及其关键技术分析[J].电子科技,2006,19(11):1-5.
- [12]程甫,於国良.T3000公用系统上层网络安全隐患分析[J].浙江电力,2017,36(7):56-59.
- [13]王斌.工业控制系统信息安全的安全保障-Achilles认证[J].自动化博览,2014,11(3):50-64.
- [14]李洁颖,邵超.基于主成分分析的拒绝服务和网络探测攻击检测[J].计算机应用,2012,32(6):1620-1622.
- [15]周开波,张治兵,倪平,等.网络设备Telnet服务安全威胁及其防范措施[J].现代电信科技,2016,46(3):11-15.
- [16]STOUFFER K,FALCO J,SCARFONE K.Guide to indus trial control systems(ICS)security:BNIST SP 800-82[S].[S.l.]:National Institute of Standards and Technology,Tech.Rep.,2008.